answers Newest RATED A+ 2025/2026 100% VERIFIED
CORRECT NEW!!
Domain 1: General Security Concepts (50 ques ons) Domain 2: Threats, Vulnerabili es, and
Mi ga ons (50 ques ons) Domain 4: Security Opera ons (50 ques ons) Domain 5: Security
Program Management and Oversight (50 ques ons) Par al Prac ce Exam (60 ques ons)
In a corporate office, employees are required to use their access cards to enter different
sec ons of the building. What type of control is being implemented in this scenario?
Detec ve control
Preven ve control
Physical control
Correc ve control
Physical control
- The use of access cards to enter different sec ons of the building is an example of physical
control, as it restricts and controls physical access to specific areas.
Detec ve controls
Help to iden fy and respond to security incidents a'er they have occurred.
- ex. security cameras
Preven ve controls
Aim to stop security incidents before they occur.
Correc ve controls
Implemented in response to iden fied security incidents.
A financial ins tu on implements encryp on for all sensi ve data transmi)ed between its
branches to ensure confiden ality. What type of control is being applied here?
Technical control
Administra ve control
Physical control
Opera onal control
,Technical control
- Encryp on is a technical control that involves the use of technology to protect sensi ve data
during transmission, ensuring its confiden ality.
Administra ve controls
involve policies, procedures, and training to shape behavior.
Physical controls
Restrict access to physical areas and assets.
Opera onal control
Focus on day-to-day processes and procedures to ensure the security of informa on systems.
A company encrypts sensi ve customer data to prevent unauthorized access. What security
principle does this primarily address?
Confiden ality
Integrity
Availability
Accountability
Confiden ality
- Encryp ng sensi ve customer data helps maintain confiden ality by protec ng it from
unauthorized access.
Integrity
Ensures that data remains accurate and unaltered.
Availability
Focuses on ensuring that resources are accessible when needed.
Accountability
Is about tracking ac ons and iden fying responsible par es.
AD
A system administrator implements regular backups to ensure that cri cal data can be restored
in the event of a hardware failure. Which security principle does this align with?
Confiden ality
,Integrity
Availability
Non-repudia on
Availability
- Regular backups contribute to the ability of cri cal data by ensuring it can be stores in case of
a hardware failure or data loss.
Confiden ality
Is about preven ng unauthorized access to sensi ve informa on.
Non-repudia on
Focuses on ensuring that a party cannot deny its ac ons.
A security mechanism is implemented to verify that data remains unchanged during
transmission over a network. Which security principle is being emphasized?
Confiden ality
Integrity
Availability
Authen ca on
Integrity
- Verifying data integrity ensures that it remains unchanged during transmission, guarding
against unauthorized altera ons.
In a network environment, what AAA component is responsible for tracking the ac vi es of
users and monitoring resource usage?
Authen ca on
Authoriza on
Accoun ng
Audi ng
Accoun ng
- Involves tracking user ac vi es and resource usage for the purpose of billing, audi ng, and
security monitoring.
Audi ng
Involves the analysis of logs and records to ensure compliance and detect security incidents.
, Authoriza on
Determines the user's access rights and permissions a'er successful authen ca on.
Authen ca on
Involves verifying the iden ty of a user.
In a mul -factor authen ca on system, which of the following is an example of something you
know?
Fingerprint scan
One- me password
Smart card
Re na scan
One- me password
- Something you know refers to knowledge-based factors, such as a password or PIN, and a one-
me password is an example of this.
Something you are
A biometric factor
- ex. fingerprint scan, re na scan
AD
Something you have
A possession-based factor
- ex. smart card
What is a common outcome of a gap analysis process in the context of cybersecurity?
A) Development of a risk management plan
B) Implementa on of compensa ng controls
C) Crea on of a security policy
D) Establishment of a remedia on plan
Establishment of a remedia on plan
- A common outcome of gap analysis is the iden fica on of security gaps and the development
of a remedia on plan to address these gaps.
Incorrect Answers Explana on: