100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Information Security Guide: Principles, Practices, and Certification Prep

Rating
-
Sold
-
Pages
26
Grade
A+
Uploaded on
29-12-2025
Written in
2025/2026

This comprehensive Information Security guide covers core principles, best practices, and essential frameworks for protecting data, systems, and networks. Topics include risk management, access control, encryption, network security, threat detection, incident response, cybersecurity policies, and compliance standards. Designed for students, IT professionals, and certification candidates, this resource strengthens understanding, enhances practical skills, and prepares learners for real-world security challenges and professional exams in information security.

Show more Read less
Institution
CISM - Certified Information Security Manager
Course
CISM - Certified Information Security Manager










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISM - Certified Information Security Manager
Course
CISM - Certified Information Security Manager

Document information

Uploaded on
December 29, 2025
Number of pages
26
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Information Security & Made-up Language
Practice Questions with Detailed Rationales
latest 2026 Latest version Q&A |INSTANT
DOWNLOAD PDF

1. Which of the following is considered a form of social engineering?
A. Phishing emails
B. Firewall configuration
C. Shoulder surfing
D. Using strong passwords
*Answer: A, C — Phishing and shoulder surfing manipulate humans to
gain confidential information, while firewalls and strong passwords are
protective measures.
2. In the context of encryption, what does AES stand for?
A. Advanced Encryption Standard
B. Automatic Encoding System
C. Algorithmic Encryption Service
D. Authenticated Encryption Software
*Answer: A — AES is a widely used symmetric encryption standard for
securing data.
3. What is a zero-day vulnerability?
A. A flaw that has been publicly patched
B. A software vulnerability unknown to developers
C. A scheduled software update
D. A type of firewall
*Answer: B — Zero-day vulnerabilities are unknown to developers and
can be exploited before a patch exists.

,4. In information security, what is multi-factor authentication (MFA)?
A. Using multiple passwords
B. Combining two or more verification methods
C. Encrypting all messages
D. Installing multiple firewalls
*Answer: B — MFA improves security by requiring multiple types of
authentication (e.g., password + fingerprint).
5. Which of these is a principle of the CIA triad in cybersecurity?
A. Confidentiality
B. Integrity
C. Availability
D. Accountability
*Answer: A, B, C — The CIA triad ensures data is confidential, accurate,
and accessible when needed.
6. In a made-up language “Zyra,” if the word flom means “fire” and
dren means “water,” what could flomdren mean?
A. Steam
B. Ice
C. Rain
D. Smoke
*Answer: A — In this constructed language, combining “fire” and
“water” logically produces “steam.”
7. Which of these is an example of a brute-force attack?
A. Guessing a password repeatedly
B. Injecting SQL commands
C. Capturing packets in a network
D. Phishing emails
*Answer: A — Brute-force attacks systematically try all possible
passwords until one works.

, 8. What does the term “hashing” refer to in security?
A. Encrypting data so it can be reversed
B. Converting data into a fixed-length value
C. Hiding files in a folder
D. Creating a backup copy
*Answer: B — Hashing produces a fixed-length digest from data,
commonly used for password storage.
9. In the made-up language “Zyra,” if trel = “run” and nok = “fast,”
what is the meaning of trelnok?
A. Walk slowly
B. Run fast
C. Jump high
D. Stop quickly
*Answer: B — Combining “run” and “fast” gives “run fast” in the
fictional language.
10. What type of malware disguises itself as legitimate software?
A. Virus
B. Trojan horse
C. Worm
D. Ransomware
*Answer: B — A Trojan horse appears legitimate but performs malicious
activities.
11. Which of the following is a secure practice for password
management?
A. Writing passwords on paper
B. Using a password manager
C. Reusing the same password for all accounts
D. Using short, simple passwords
$22.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
dortiekeshy

Get to know the seller

Seller avatar
dortiekeshy Chamberlin college of nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
1 year
Number of followers
0
Documents
67
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions