ASSESSMENT Study Guide
Comprehensive Resource To Help You Ace 2026-2027
Includes Frequently Tested Questions With ELABORATED
100% Correct COMPLETE SOLUTIONS
Guaranteed Pass First Attempt!! Current Update!!
1. What are the Six Ethical Lenses that can help when choosing a proper
framework for ethics? - ANSWER 1. The Justice Lens: Justice is the idea
that each person should be given their due, and what people are due is
often interpreted as fair or equal treatment.
2. The Utilitarian Lens: A results-based approach, says that the ethical action
is the one that produces the greatest balance of good over harm for as many
stakeholders as possible.
3. The Common Good Lens: According to the common good approach,
community life is good in itself and our actions should contribute to that life.
4. The Virtue Lens: A very ancient approach to ethics argues that ethical
actions ought to be consistent with certain ideal virtues that provide for the full
development of our humanity.
5. The Care Ethics Lens: A very ancient approach to ethics argues that ethical
actions ought to be consistent with certain ideal virtues that provide for the full
development of our humanity.
6. The Rights Lens: Some suggest that the ethical action is the one that best
protects and respects the moral rights of those affected.
,2. Why are computer incidents so prevalent, and what are their effects? -
ANSWER 1. Complexity: So many devices/environments in an infrastructure
introduce vulnerabilities.
2. Incorrect authentication/Compromised login: Personal information being
taken/manipulated for authentication of someone's account.
3. Technological advancements: Information out in the open of certain builds can
allow individuals to gather information for exploits.
4. Delayed Fixes: Software updates take time to be pushed out, so the possibility
for vulnerabilities to occur is high.
Extra:
Bring Your Own Device (BYOD) all-time availability introduces extra security treats,
where data can be accessed and used maliciously.
3. What can be done to implement a strong security program to prevent
cyberattacks? - ANSWER 1. Creating data backups and encrypting sensitive
information.
2. Updating all security systems and software.
3. Conducting regular employee cybersecurity training.
4. Using strong and complex passwords.
5. Installing firewalls.
6. Reducing your attack surfaces.
4. What are the 3 key prevention measures of cyber attacks? - ANSWER 1.
Use antivirus software to protect your computer against malware.
2. Use firewalls to filter the traffic that may enter your device.
,3. Stay alert and avoid clicking on a suspicious link.
5. What are the ways to implement cyber security? - ANSWER 1. Use strong
passwords. Strong passwords are vital to good online security.
2. Control access to data and systems.
3. Put up a firewall.
4. Use security software.
5. Update programs and systems regularly.
6. Monitor for intrusion.
7. Raise awareness.
6. What actions must be taken in the event of a successful security intrusion? -
ANSWER The security incident response process is centered on the
1. preparation
2. detection and analysis
3. containment
4. investigation
5. eradication
6. recovery
7. post-incident activity
7. What actions should be taken in response to a security incident? - ANSWER
1. Gather the team.
2. Identify, evaluate and contain the incident.
, 3. Recover and restore.
4. Notify those affected by the breach.
5. Resolve internal issues.
6. Get the word out.
7. Perform a security incident postmortem.
8. What are the 5 steps to incident response? - ANSWER Step 1: Preparation
is key to an effective response.
Step 2: Detection and analysis.
Step 3: Containment, eradication, and recovery.
Step 4: Post-incident activity.
Step 5: Test your plan.
9. How do I demonstrate the use of the CIA triad? - ANSWER CIA =
confidentiality, integrity, and availability.
- Categorize data and assets being handled based on their privacy requirements.
Require data encryption and two-factor authentication to be basic security
hygiene.
10. What does the individual meaning of acronym CIA/AIC? - ANSWER
Confidentiality is a set of high-level rules that limit access to all types of data and
information.
- Integrity is the assurance that the information is trustworthy and accurate.