Answers 2024/2025
Which of the following characteristics relates to access control? - ANSWERSThe process or mechanism of
granting or denying use of resources; typically applied to users or generic network traffic
Which term describes an object, computer, program, piece of data, or other logical or physical
component you use in a business process to accomplish a business task? - ANSWERSAsset
When conducting an audit, the auditor should be which of the following? - ANSWERSAn external person
who is independent of the organization under audit
Which of the following describes authentication? - ANSWERSThe process of confirming the identity of a
user
Which term describes when a system is usable for its intended purpose? - ANSWERSAvailability
Which of the following is the name given to unauthorized access to a system? - ANSWERSBackdoor
Which of the following is a malicious software program distributed by a hacker to take control of a
victim's computers? - ANSWERSAgent
Which term describes the calculation of the total loss potential across a year for a given asset and a
specific threat? - ANSWERSAnnualized Loss Expectancy (ALE)
Which of the following refers to a form of encryption also known as point to point or host to host
encryption? - ANSWERSTransport Mode Encryption
, Which name is given to a probability prediction based on statistics and historical occurrences on the
likelihood of how many times in the next year a threat is going to cause harm? - ANSWERSAnnualized
Rate of Occurrence (ARO)
Which of the following describes an appliance firewall? - ANSWERSA Hardened Hardware Firewall
Which of the following characteristics describes the application layer? - ANSWERSThe top or seventh
layer of the OSI model, which is responsible for enabling communications with host software, including
the operating system
Which of the following is a malicious remote control tool? - ANSWERSNetBus
Which of the following creates TCP and UDP network connections to or from any port? -
ANSWERSNetCat
Which of the following uses ICMP as a tunneling protocol? - ANSWERSLoki
There are six steps for writing a security incident response plane. Which of the following is not a step? -
ANSWERSReport
Which of the following describes the principle that for an organization's security policy to be effective,
everyone must be forced to work within it and follow its rules? - ANSWERSUniversal Participation
Which of the following describes Security Stance? - ANSWERSAn organization's filtering configuration; it
answers the question, "What should be allowed and what should be blocked?"
Which of the following provides faster access to static content for external users accessing internal Web
servers? - ANSWERSReverse Caching
Which of the following refers to an operating system built exclusively to run on a bastion host device? -
ANSWERSProprietary OS