2026 FULL ANSWERS REVIEW GRADED A+
◉ What is social engineering? Answer: Masquerading as a real or
fictitious character and then playing out the role of that person on a
target
◉ One of the two security guards on duty at a company goes on a
periodic patrol tour. The guard drives around the outside perimeter
of the premises, which is under videos surveillance. The guard also
verifies there is no suspicious or abnormal activity and restricted
areas. What type of security has this company adopted? Select two.
Answer: Active security defense and two-person integrity
◉ An individual who was recently fired goes to their former place of
employment on a weekend. Since they are unable to enter, security
goes to the front door to inquire. The fired employee says they forgot
their access card and just needs to pick up their tablet in their office.
What attacks surface is the former employee trying to exploit?
Answer: Human vector
◉ An intruder breaks into a large storehouse. An ultrasonic
censored triggers, the alarm 1/4 of a second after detecting the
intruder. About how far was the intruder when the alarm sounded?
Answer: 43 meters
,◉ What is the formula for an ultrasonic sensor at sea level? Answer:
Distance = 1/2(time)*343
◉ What type of security buffer are you most likely to encounter at a
high security data center that enforces restricted access and
requires a security clearance gain entry? Answer: Access control
vestibule
◉ What is an automated access control vestibule used for? Answer:
It is used to create a buffer to separate a nonsecure area from a
secure area
◉ Which one of the following techniques is most likely to be in a
system that is able to detect when a vehicle enters a restricted area
and the direction in which it is headed? Answer: Pressure sensors
◉ Which of the following most accurately describes the differences
or similarities between typos squatting and cybersquatting? Select
two Answer: A domain name with a one letter change relative to an
authentic site is an example of typo squatting. Cybersquatting is
registering a domain that contains trademarks and then selling it
, ◉ Which of the following statements best describes the critical
factor that allows crypto graphic algorithms to be effective? Answer:
The key(s) used by algorithms must be securely guarded
◉ What is the critical factor in cryptography? Answer: One more
elements must be kept secret at all cost. Cryptographic algorithms
are designed to be public and well-known, and how they function is
no secret. However, the individualized key for the algorithm that the
user possesses must always be kept secret
◉ A company is exploring a variety of symmetric key algorithms to
use in an app. Which of the following statements best describes a
possible concern? Answer: The key must be kept private
◉ How do symmetric cryptographic algorithms work? Answer: It
uses the same key to encrypt and decrypt data.
◉ Kalaki subscribes to an online computer digest. Kalaki notices a
string of characters with a message next to a link that reads "... used
to verify file integrity after downloading." what does the string of
characters represent? Select four. Answer: A digital fingerprint
The result of a one-way algorithm
A hash
A message digest