Certification Exam Preparation (2025- |\ |\ |\
2026) QUESTIONS WITH ANSWERS
|\ |\ |\
What are the three key objectives of cybersecurity
|\ |\ |\ |\ |\ |\ |\ |\
programs? (Fig 1.1) - CORRECT ANSWERS |\ |\ |\ |\ |\ |\
✔✔Confidentiality, integrity, and availability |\ |\ |\
What are the three key threats to cybersecurity
|\ |\ |\ |\ |\ |\ |\ |\
programs? (Fig 1.2) - CORRECT ANSWERS ✔✔Disclosure,
|\ |\ |\ |\ |\ |\ |\
alteration, and denial |\ |\
Client-server botnet control model (Fig 3.1) - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔ |\
Peer-to-peer botnet control model (Fig 3.2) - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔ |\
Fileless virus attack chain (Fig 3.3) - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\
✔✔
John the Ripper example (Fig 4.1) - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\
✔✔
,What are the Chapter 1 Exam Essentials? (part 1) (Lesson
|\ |\ |\ |\ |\ |\ |\ |\ |\
1.6) - CORRECT ANSWERS ✔✔
|\ |\ |\ |\ |\
What are the Chapter 1 Exam Essentials? (part 2) (Lesson
|\ |\ |\ |\ |\ |\ |\ |\ |\
1.6) - CORRECT ANSWERS ✔✔
|\ |\ |\ |\ |\
Logo of the hacktivist group Anonymous (Fig 2.1) -
|\ |\ |\ |\ |\ |\ |\ |\ |\
CORRECT ANSWERS ✔✔ |\ |\
Dark web market (Fig 2.2) - CORRECT ANSWERS ✔✔
|\ |\ |\ |\ |\ |\ |\ |\
Recent alert listing from the CISA website (Fig 2.3) -
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
CORRECT ANSWERS ✔✔ |\ |\
FireEye Cybersecurity Threat Map (Fig 2.4) - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔ |\
What are the Chapter 2 Exam Essentials? (part 1) (Lesson
|\ |\ |\ |\ |\ |\ |\ |\ |\
2.4) - CORRECT ANSWERS ✔✔
|\ |\ |\ |\ |\
What are the Chapter 2 Exam Essentials? (part 2) (Lesson
|\ |\ |\ |\ |\ |\ |\ |\ |\
2.4) - CORRECT ANSWERS ✔✔
|\ |\ |\ |\ |\
, What are the Chapter 3 Exam Essentials? (Lesson 3.5) -
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
CORRECT ANSWERS ✔✔ |\ |\
What are the Chapter 4 Exam Essentials? (part 1) (Lesson
|\ |\ |\ |\ |\ |\ |\ |\ |\
4.5) - CORRECT ANSWERS ✔✔
|\ |\ |\ |\ |\
Qualys asset map (Fig 5.1) - CORRECT ANSWERS ✔✔
|\ |\ |\ |\ |\ |\ |\ |\
Configuring a Nessus scan (Fig 5.2) - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\
✔✔
Sample Nessus scan report (Fig 5.3) - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\
✔✔
|\
Nessus scan templates (Fig 5.4) - CORRECT ANSWERS ✔✔
|\ |\ |\ |\ |\ |\ |\ |\
Disabling unused plug-ins (Fig 5.5) - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\
✔✔
Configuring credentialed scanning (Fig 5.6) - CORRECT
|\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔ |\
Choosing a scan appliance (Fig 5.7) - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\
✔✔