(Latestl 2025/l 2026l Update)l Cybersecurityl
Architecturel andl Engineering|l Questionsl
&l Answers|l Gradel A|l 100%l Correctl
(Verifiedl Solutions)-l Galen
Q:l Al companyl isl lookingl tol protectl sensitivel datal storedl onl itsl storagel devicesl andl
ensurel thatl thisl datal isl securel froml unauthorizedl access.l Thel companyl isl lookingl forl al
solutionl thatl providesl al highl levell ofl securityl andl protectionl forl itsl data.
l l Whichl securityl technologyl willl protectl sensitivel datal storedl onl thel company'sl storagel
devicesl byl automaticallyl initiatingl securityl proceduresl asl theyl arel writtenl tol thel device?
A)l Self-encryptingl drives
B)l Hardwarel securityl modulel (HSM)
C)l Two-factorl authentication
D)l Measuredl boot
Answer:
A)l Self-encryptingl drives
Q:l Al companyl isl concernedl aboutl advancedl persistentl threatsl andl targetedl attacksl onl
itsl computerl systems.l Thel companyl wantsl tol implementl al securityl solutionl thatl canl
detectl andl respondl tol anyl suspiciousl activityl onl itsl systems.
l l Whichl securityl technologyl meetsl thel needsl ofl thisl company?
A)l Endpointl detectionl andl responsel (EDR)l software
B)l Hardwarel securityl modulel (HSM)
C)l Two-factorl authentication
D)l Antivirusl tools
Answer:
A)l Endpointl detectionl andl responsel (EDR)l software
Q:l Anl enterprisel isl deployingl al newl softwarel applicationl thatl requiresl al cryptographicl
protocoll tol securel datal transmission.l Thel applicationl willl bel usedl tol processl sensitivel
customerl information,l andl thel companyl wantsl tol ensurel thatl thel datal isl protectedl
duringl transmission.
l l Whichl cryptographicl protocoll meetsl thel needsl ofl thel enterprise?
A)l Transportl Layerl Securityl (TLS)l withl Advancedl Encryptionl Standardl (AES)
B)l Securel Socketsl Layerl (SSL)l withl Datal Encryptionl Standardl (DES)
,C)l Point-to-Pointl Tunnelingl Protocoll (PPTP)l withl Triplel Datal Encryptionl Standardl
(3DES)
D)l Hypertextl Transferl Protocoll Securel (HTTPS)l withl Rivest-Shamir-Adlemanl (RSA)
Answer:
A)l Transportl Layerl Securityl (TLS)l withl Advancedl Encryptionl Standardl (AES)
Q:l Whichl emergingl technologyl hasl thel potentiall tol significantlyl impactl thel securityl
ofl currentl encryptionl methodsl byl makingl itl possiblel tol quicklyl solvel mathematicall
problemsl thatl arel currentlyl consideredl difficultl orl impossiblel tol solve?
A)l Quantuml computing
B)l Blockchain
C)l Artificiall intelligencel (AI)
D)l Augmentedl realityl (AR)
Answer:
A)l Quantuml computing
Q:l Whichl public-keyl cryptosysteml usesl primel factorizationl asl thel basisl forl itsl
security?
A)l Rivest-Shamir-Adlemanl (RSA)
B)l Digitall Signaturel Algorithml (DSA)
C)l Ellipticl Curvel Digitall Signaturel Algorithml (ECDSA)
D)l Diffie-Hellmanl (DH)
Answer:
A)l Rivest-Shamir-Adlemanl (RSA)
Q:l Thel companyl plansl tol deployl al cryptographicl systeml forl theirl digitall signatures,l
whichl employsl al publicl keyl cryptosysteml thatl isl basedl onl figuresl describedl byl thel
equationl y^2l =l x^3l +l axl +l b.
l l Whichl public-keyl cryptosysteml doesl thisl describe?
A)l Ellipticl Curvel Digitall Signaturel Algorithml (ECDSA)
B)l Rivest-Shamir-Adlemanl (RSA)
C)l Digitall Signaturel Algorithml (DSA)
D)l Diffie-Hellmanl (DH)
Answer:
A)l Ellipticl Curvel Digitall Signaturel Algorithml (ECDSA)
Q:l Whichl keyl exchangel algorithml isl usedl tol establishl al sharedl secretl keyl betweenl
twol partiesl withoutl thel needl forl al pre-sharedl secretl orl publicl keyl exchange?
A)l Diffie-Hellmanl (DH)
B)l Rivest-Shamir-Adlemanl (RSA)
C)l Digitall Signaturel Algorithml (DSA)
,D)l Ellipticl Curvel Diffie-Hellmanl (ECDH)
Answer:
A)l Diffie-Hellmanl (DH)
Q:l Whichl blockl cipherl model ofl operationl isl resistantl tol ciphertextl manipulationl
attacksl byl thel previousl ciphertextl blockl withl thel currentl plaintextl blockl beforel
encryption?
A)l Cipherl blockl chainingl (CBC)
B)l Electronicl codebookl (ECB)
C)l Outputl feedbackl (OFB)
D)l Counterl (CTR)
Answer:
A)l Cipherl blockl chainingl (CBC)
Q:l Whichl authenticatedl encryptionl model ofl operationl usesl al one-timel keyl andl al
functionl tol providel strongl messagel authenticationl andl isl designedl tol bel fast?
A)l Poly1305
B)l Cipherl blockl chainingl (CBC)
C)l Electronicl codebookl (ECB)
D)l Counterl (CTR)
Answer:
A)l Poly1305
Q:l Whichl riskl managementl strategyl willl ensurel thel securityl ofl datal storedl onl al
softwarel application?
A)l Encryptionl ofl alll sensitivel datal storedl withinl thel application
B)l Installationl ofl thel latestl antivirusl softwarel onl alll computersl thatl accessl thel
application
C)l Configurationl ofl thel applicationl tol requirel strong,l uniquel passwordsl forl alll userl
accounts
D)l Implementationl ofl al strictl firewalll policyl tol restrictl accessl tol thel application'sl server
Answer:
A)l Encryptionl ofl alll sensitivel datal storedl withinl thel application
Q:l Whichl riskl managementl strategyl willl reducel thel threatl surfacel onl al newl webl
application?
A)l Usel ofl hardeningl measuresl tol removel unnecessaryl services,l protocols,l andl
applications
B)l Implementationl ofl end-to-endl encryptionl forl alll userl data
C)l Configurationl ofl thel webl applicationl tol disablel alll externall devicel connectionsl onl
alll workstations
, D)l Implementationl ofl regularl virusl scanningl forl alll workstations
Answer:
A)l Usel ofl hardeningl measuresl tol removel unnecessaryl services,l protocols,l andl
applications
Q:l Whichl statementl describesl thel rolel ofl riskl tolerancel inl thel developmentl ofl al
financiall servicesl company'sl mobilel applicationl forl managingl customerl accountsl andl on-
the-gol transactions?
A)l Riskl tolerancel helpsl thel companyl determinel thel acceptablel levell ofl riskl forl thel
mobilel applicationl basedl onl itsl potentiall impactl onl thel companyl andl itsl customers.
B)l Riskl tolerancel determinesl thel specificl securityl controlsl thatl mustl bel implementedl inl
thel mobilel application.
C)l Riskl tolerancel ensuresl thatl thel company'sl developmentl teaml isl trainedl inl
cybersecurityl bestl practices.
D)l Riskl tolerancel guidesl thel decision-makingl processl regardingl thel trade-offl betweenl
thel levell ofl innovationl andl thel levell ofl riskl inl thel mobilel application.
Answer:
A)l Riskl tolerancel helpsl thel companyl determinel thel acceptablel levell ofl riskl forl thel
mobilel applicationl basedl onl itsl potentiall impactl onl thel companyl andl itsl customers.
Q:l Al softwarel companyl usesl al structuredl queryl languagel (SQL)l databasel tol storel
customerl data,l suchl asl names,l addresses,l andl creditl cardl information.l Thel ITl securityl
teaml hasl identifiedl severall potentiall vulnerabilitiesl thatl couldl resultl inl al datal breach,l
includingl SQLl injectionl attacksl andl weakl authenticationl controls.l
l l Whichl riskl managementl strategyl canl reducel thel riskl ofl al datal breach?
A)l Enforcingl strongl authenticationl controlsl andl limitingl accessl tol thel SQLl databasel tol
helpl preventl unauthorizedl access
B)l Encryptingl sensitivel customerl informationl storedl inl thel SQLl databasel tol helpl
preventl unauthorizedl access
C)l Implementingl intrusionl detectionl andl preventionl systemsl tol helpl detectl andl preventl
unauthorizedl accessl tol thel SQLl database
D)l Regularlyl scanningl thel SQLl databasel forl vulnerabilitiesl andl takingl actionl tol
remediatel them
Answer:
A)l Enforcingl strongl authenticationl controlsl andl limitingl accessl tol thel SQLl databasel tol
helpl preventl unauthorizedl access
Q:l Al retaill companyl isl requiredl tol complyl withl thel Paymentl Cardl Industryl Datal
Securityl Standardl (PCIl DSS),l whichl establishesl securityl requirementsl forl companiesl thatl
process,l store,l orl transmitl creditl cardl information.l Thel companyl isl planningl tol integratel
wirelessl networksl intol itsl storesl tol providel freel Wi-Fil tol customers.
l l Whichl Wi-Fil encryptionl standardl willl meetl thel needsl ofl thel company?