SECURITY ACTUAL EXAM 2024 ASSESSMENT
TESTBANK QUESTIONS AND CORRECT ANSWERS
WITH RATIONALES ALREADY GRADED A+
The Fabrication attack type most commonly affects which principle(s) of the CIA triad?
A Availability
B Integrity
C Confidentiality
D Integrity and Availability
E Confidentiality and Integrity
Integrity and Availability
Controls that protect the systems, networks, and environments that process, transmit, and store our
data are called .
A Physical controls
B Logical controls
C Administrative controls
Logical controls
During what phase of the incident response process do we determine what happened, why it happened,
and what we can do to keep it from happening again?
A Containment
B Detection and Analysis
C Preparation
D Post-incident Activity
,E Recovery
Post-incident Activity
The biometric characteristic that measures how well a factor resists change over time and with
advancing age is called .
A Collectability
B Acceptability
C Universality
D Uniqueness
E Permanence
Permanence
What type of authentication can prevent a man-in-the-middle attack?
A Something you know
B Something you are
C Something you do
D Multifactor
E Mutual
Mutual
A badge or token is considered what type of authentication?
A Something you are
B Something you have
C Something you know
D Where you are
E Something you do
, Something you have
The set of methods we use to establish a claim of identity as being true is called .
A Authentication
B Authorization
C Identification
D Identify verification
Authentication
A fingerprint is considered what type of authentication?
A Something you know
B Something you have
C Something you are
D Something you do
E Where you are
Something you are
A password or PIN is considered what type of authentication?
A Something you have
B Something you are
C Something you do
D Where you are
E Something you know
Something you know
, What type of access control can prevent the confused deputy problem?
A Capability-based security
B A password policy
C ACLs
D A locked door
Capability-based security
A user who creates a network share and sets permissions on that share is employing which model of
access control?
A Attribute-based access control
B Role-based access control
C Mandatory access control
D Discretionary access control
Discretionary access control
A client-side attack that involves the attacker placing an invisible layer over something on a website that
the user would normally click on, in order to execute a command differing from what the user thinks
they are performing, is known as .
A Tailgating
B Clickjacking
C Phishing
D Spear phishing
E Cross-site request forgery
Clickjacking
A VPN connection that is set to time out after 24 hours is demonstrating which model of access control?
A Role-based access control