EXAM 2025 | ACTUAL REAL EXAM
ACCURATE QUESTIONS AND ANSWERS
WITH RATIONALES | VERIFIED AND
LATEST UPDATED |GUARANTEED PASS
1. Which of the following is the best practice to implement when securing log
files?
A. Delete logs daily
B. Encrypt logs with user passwords
C. Copy the logs to a remote log server
D. Store logs on the same server they’re generated on
✅ Correct Answer: C. Copy the logs to a remote log server
Rationale: This prevents tampering by ensuring logs are kept on a separate, secure
server.
2. Which of the following should be done if an audit recording fails?
A. Ignore the failure
B. Delete audit logs
C. Send an alert to the administrator
D. Restart the server
✅ Correct Answer: C. Send an alert to the administrator
Rationale: Prompt alerts ensure immediate action can be taken to restore logging
integrity.
3. In what way can you gather information from a remote printer?
A. FTP
B. SNMP
C. SSH
D. Telnet
✅ Correct Answer: B. SNMP
Rationale: SNMP is used for managing and monitoring network devices, including
printers.
4. What is the main reason to frequently view the logs of a DNS server?
A. To optimize DNS caching
B. To monitor server uptime
C. To watch for unauthorized zone transfers
D. To balance traffic
,✅ Correct Answer: C. To watch for unauthorized zone transfers
Rationale: Unauthorized zone transfers can reveal internal DNS structure to attackers.
5. You are setting up auditing on a Windows computer. If set up properly, which
log should have entries?
A. Application log
B. Security log
C. System log
D. Setup log
✅ Correct Answer: B. Security log
Rationale: The Security log stores records of auditing events in Windows.
6. The IT director has asked you to install agents on several client computers and
monitor them from a server. What is this known as?
A. RADIUS
B. SNMP
C. Syslog
D. SMTP
✅ Correct Answer: B. SNMP
Rationale: SNMP uses agents on clients to report performance and status to a
management server.
7. Which of the following deals with the standard load for a server?
A. Load balancer
B. Configuration baseline
C. Audit trail
D. Monitoring agent
✅ Correct Answer: B. Configuration baseline
Rationale: A configuration baseline is used to define the standard performance and
configuration for comparison.
8. Which statement correctly describes the difference between a secure cipher
and a secure hash?
A. A cipher and hash are reversible
B. A cipher can be reversed; a hash cannot
C. A hash is encrypted data
D. A cipher creates a checksum
✅ Correct Answer: B. A cipher can be reversed; a hash cannot
Rationale: Ciphers are reversible with a key, while hashes are one-way operations.
9. Which of the following is the weakest encryption type?
A. AES
B. RSA
, C. DES
D. ECC
✅ Correct Answer: C. DES
Rationale: DES uses only a 56-bit key and is considered insecure by modern standards.
10. What is another term for secret key encryption?
A. Asymmetric
B. One-way encryption
C. Public key encryption
D. Symmetrical
✅ Correct Answer: D. Symmetrical
Rationale: Symmetrical encryption uses the same key for both encryption and
decryption.
11. Your boss wants you to set up an authentication scheme where employees
use smart cards to log in to the company network. What kind of key should be
used?
A. Session key
B. Public key
C. Private key
D. Shared key
✅ Correct Answer: C. Private key
Rationale: Smart cards store private keys, which are used in public key cryptography for
authentication.
12. You need an asymmetric encryption method with strong encryption and
shorter key lengths. Which method should you choose?
A. RSA
B. DES
C. ECC
D. AES
✅ Correct Answer: C. ECC
Rationale: Elliptic Curve Cryptography (ECC) provides strong encryption with shorter
key lengths.
13. What does it mean if a hashing algorithm creates the same hash for two
different downloads?
A. Integrity
B. Authentication
C. A collision has occurred
D. The file is compressed
✅ Correct Answer: C. A collision has occurred
Rationale: A hash collision occurs when two different inputs produce the same output,
compromising integrity.