INFORMATION SECURITY EXAM TESTBANK WITH 500
COMPLETE ACTUAL QUESTIONS AND CORRECT
DETAILED ANSWERS (100% CORRECT VERIFIED
SOLUTIONS) A NEW UPDATED VERSION 2024-2025
|ALREADY GRADED A+
A new start-up company has started working on a social
networking website. The company has moved all its source
code to a cloud provider and wants to protect this source code
from unauthorized access. Which cyber defense concept should
the start-up company use to maintain the confidentiality of its
source code?
Answer- File encryption
A company has an annual audit of installed software and data
storage systems. During the audit, the auditor asks how the
company's most critical data is used. This determination helps
the auditor ensure that the proper defense mechanisms are in
place to protect critical data. Which principle of the Parkerian
hexad is the auditor addressing?
Answer- Utility
,Which web attack is possible due to a lack of input validation?
Answer- SQL injection
Which cybersecurity term is defined as the potential for an
attack on a resource?
Answer- Threat
Which security type deliberately exposes a system's
vulnerabilities or resources to an attacker?
Answer- Honeypots
An organization employs a VPN to safeguard its information.
Which security principle is protected by a VPN?
Answer- Data in Motion
,A malicious hacker was successful in a denial of service (DoS)
attack against an institution's mail server. Fortunately, no data
was lost or altered while the server was offline. Which type of
attack is this?
Answer- Interruption
A company has had several successful denial of service (DoS)
attacks on its email server. Which security principle is being
attacked?
Answer- Availability
Which file action implements the principle of confidentiality
from the CIA triad?
Answer- Encryption
Which cyber defense concept suggests limiting permissions to
only what is necessary to perform a particular task?
Answer- Principle of least privilege
, A company institutes a new policy that "All office computer
monitors must face toward employees and must face away
from doorways. The monitor screens must not be visible to
people visiting the office." Which principle of the CIA triad is
this company applying?
Answer- Confidentiality
A company's IT policy manual states that "All company
computers, workstations, application servers, and mobile
devices must have current versions of antivirus software."
Which principle or concept of cybersecurity does this policy
statement impact?
Answer- Operating System Security
An organization's procedures document states that "All
electronic communications should be encrypted during
transmission across networks using encryption standards
specified in the data encryption policy." Which security
principle is this policy addressing?
Answer- Confidentiality