WITH ANSWERS UPDATED 2025 - 2026
To,determine,whether,an,attack,has,occurred,or,is,underway,,NIDPSs,compare,measured,activity,to,know
n,_____,in,their,knowledge,base.,,ANS,-,signatures
Like,the,CISSP,,the,SSCP,certification,is,more,applicable,to,the,security,_____,than,to,the,security,_____.,,
ANS,-,manager,,technician
The,_____,vulnerability,assessment,is,a,process,designed,to,find,and,document,selected,vulnerabilities,th
at,are,likely,to,be,present,on,the,organization's,internal,network.,,ANS,-,intranet
The,_____,involves,collecting,information,about,an,organization's,objectives,,its,technical,architecture,,an
d,its,information,security,environment.,,ANS,-,SecSDLC
The,_____,is,a,center,of,Internet,security,expertise,and,is,located,at,the,Software,Engineering,Institute,,a,f
ederally,funded,research,and,development,center,operated,by,Carnegie,Mellon,University.,,ANS,-
,CERT/CC
A,_____,vulnerability,scanner,listens,in,on,the,network,and,identifies,vulnerable,versions,of,both,server,a
nd,client,software.,,ANS,-,passive
The,_____,is,a,statement,of,the,boundaries,of,the,RA.,,ANS,-,scope
A,_____,is,the,information,used,in,conjunction,with,an,algorithm,to,create,the,ciphertext,from,the,plainte
xt,or,derive,the,plaintext,from,the,ciphertext.,,ANS,-,key
A,_____,is,the,recorded,condition,of,a,particular,revision,of,a,software,or,hardware,configuration,item.,,A
NS,-,version
The,_____,layer,of,the,bull's-
eye,model,includes,computers,used,as,servers,,desktop,computers,,and,systems,used,for,process,control,
and,manufacturing,systems,,ANS,-,systems
, The,ability,to,detect,a,target,computer's,_____,is,very,valuable,to,an,attacker.,,ANS,-,operating,systems
The,_____,layer,of,the,bull's-eye,model,receives,attention,last.,,ANS,-,Applications
Using,__________,,the,system,reviews,the,log,files,generated,by,servers,,network,devices,,and,even,other
,IDPSs.,,ANS,-,LFM
The,Lewin,change,model,consists,of,_____.
-unfreezing
-moving
-refreezing,,ANS,-,all,of,the,above
A(n),_____,works,like,a,burglar,alarm,in,that,it,detects,a,violation,(some,system,activities,analogous,to,an,
opened,or,broken,window),and,activities,an,alarm.,,ANS,-,IDPS
A,_____,is,usually,the,bets,approach,to,security,project,implementation.,,ANS,-,phased,implementation
DES,uses,a(n),_____,-bit,block,size.,,ANS,-,64
An,X,509,v3,certificate,binds,a,_____,,which,uniquely,identifies,certificate,entity,,to,a,user's,public,key.,,AN
S,-,distinguished,name
Digital,signatures,should,be,created,using,processes,and,products,that,are,based,on,the,_____.,,ANS,-,DSS
The,_____,protocol,provides,system-to-
system,authentication,and,data,integrity,verification,,but,does,not,provide,secrecy,for,the,content,of,a,ne
twork,communication.,,ANS,-,AH
The,ISSEP,allows,CISSP,holders,to,demonstrate,expert,knowledge,of,all,the,following,except,_____.,,ANS,-
,international,laws