CONCEPTS (2025) –110 MOST TESTED QUESTIONS WITH
VERIFIED ANSWERS
Threat environment consists of the types of attackers and attacks that companies face. T/F -
CORRECT ANSWER-TRUE
2) Confidentiality means that attackers cannot change or destroy information.
T/F - CORRECT ANSWER-FALSE
3) The three common core goals of security are ________.
A) confidentiality, integrity, and availability
B) confidentiality, information, and availability
C) confidentiality, integrity, and authentication
D) confidentiality, information, and authorization - CORRECT ANSWER-A
4) If an attacker breaks into a corporate database and deletes critical files, this is a attack against the
________ security goal.
A) integrity
B) confidentiality
C) Both A and B
D) Neither A nor B - CORRECT ANSWER-A
5) Which of the following are types of countermeasures?
A) Preventative
B) Detective
C) Corrective
D) All of the above - CORRECT ANSWER-D
6) When a threat succeeds in causing harm to a business, this is called a ________.
A) breach
,B) compromise
C) incident
D) All of the above - CORRECT ANSWER-D
7) When a threat succeeds in causing harm to a business, this is a(n) ________.
A) breach
B) countermeasure
C) Both A and B
D) Neither A nor B - CORRECT ANSWER-A
8) Another name for safeguard is ________.
A) countermeasure
B) compromise
C) Both A and B
D) Neither A nor B - CORRECT ANSWER-A
9) Which of the following is a type of countermeasure?
A) Detective
B) Corrective
C) Both A and B
D) Neither A nor B - CORRECT ANSWER-C
10) Preventative countermeasures identify when a threat is attacking and especially when it is
succeeding.
T/F - CORRECT ANSWER-FALSE
11) Detective countermeasures identify when a threat is attacking and especially when it is
succeeding. - CORRECT ANSWER-TRUE
12) Detective countermeasures keep attacks from succeeding. - CORRECT ANSWER-FALSE
, 13) Preventative countermeasures keep attacks from succeeding. - CORRECT ANSWER-TRUE
14) Most countermeasure controls are preventative controls. - CORRECT ANSWER-TRUE
15) Most countermeasure controls are detective controls. - CORRECT ANSWER-FALSE
16) The attack method used in the Sony data breaches was ________.
A) Cross-site scripting
B) SQL injection
C) Denial of service
D) None of the above - CORRECT ANSWER-B
17) About how long was the Sony PlayStation Network offline as a result of the cyber attacks?
A) 3 days
B) 3 weeks
C) 3 months
D) It never went down. - CORRECT ANSWER-B
18) Which hacker group was likely involved in the Sony data breaches?
A) LulzSec
B) Wikileaks
C) Chaos Club 7
D) L33t |\|3RD5 - CORRECT ANSWER-A
19) Why did hackers attack Sony Corp?
A) To test their technical skills
B) Because Sony was suing a fellow hacker
C) As part of a larger cyberwar exercise
D) Because Sony put a malicious rootkit on certain music disks - CORRECT ANSWER-B