ASSESSMENT QUESTIONS WITH
CORRECT ANSWERS 2025
AnQattackerQusesQaQsnifferQtoQgainQsessionQcookiesQaQclientQsendsQoverQanQunsecuredQnetwork.QWhatQtyp
eQofQattackQcanQtheQmaliciousQactorQnowQuseQtheQsessionQcookiesQtoQconduct?Q-QCORRECTQANSWERQ-
SessionQhijacking
AQcompanyQlocatedQinQtheQwesternQUnitedQStatesQthatQusesQcloudQcomputingQreliesQonQredundantQsyste
msQinQadjacentQavailabilityQzonesQforQdataQbackupQandQstorage.QAnalyzeQtheQconfigurationQandQdetermin
eQwhichQlevelQofQhighQavailabilityQserviceQtheQcompanyQutilizes.Q-QCORRECTQANSWERQ-
RegionalQreplication
SystemsQadministratorsQconfigureQanQapplicationQsuiteQthatQusesQaQcollectionQofQsingleQhashQfunctionsQan
dQsymmetricQciphersQtoQprotectQsensitiveQcommunication.QWhileQtheQsuiteQusesQtheseQsecurityQfeaturesQ
collectively,QhowQisQeachQinstanceQrecognized?Q-QCORRECTQANSWERQ-AsQaQcryptographicQprimitive
AnQemployeeQthatQcarriesQaQcompanyQcreditQcardQlearnsQthatQtheQcardQhasQbecomeQcompromised.QTheQe
mployeeQonlyQremembersQfuelingQaQcompanyQvehicle.QConsiderQtheQfollowingQviableQmethodsQandQdeter
mineQwhichQmethodQcompromisedQtheQcard.Q-QCORRECTQANSWERQ-CardQskimming
WhichQstatementQcorrectlyQdifferentiatesQbetweenQfileQtransferQprotocolQ(FTP),QsecureQshellQfileQtransferQ
protocolQ(SFTP),QandQfileQtransferQprotocolQoverQsecureQsocketQlayerQ(FTPS)?Q-QCORRECTQANSWERQ-
FTPQhasQnoQencryption.QFTPSQaddsQtransportQlayerQsecurityQ(TLS),QandQSFTPQisQanQentirelyQdifferentQproto
colQbasedQonQtheQnetworkQprotocolQSSHQ(secureQshell).
AnalyzeQtheQfactorsQassociatedQwithQperformingQaQBusinessQProcessQAnalysisQ(BPA)QandQselectQtheQstate
mentQthatQalignsQwithQtheQoutputQfactors.Q-QCORRECTQANSWERQ-
TheQdataQorQresourcesQaQfunctionQproduces
ConsiderQanQabstractQmodelQofQnetworkQfunctionsQforQanQinfrastructureQasQcodeQ(IaC)QimplementationQa
ndQdetermineQwhichQplaneQdescribesQhowQtrafficQisQprioritized.Q-QCORRECTQANSWERQ-Control
AQnetworkQadministratorQisQpreparingQaQstrategyQforQbackingQupQcompanyQdata.QWhichQofQtheQfollowingQi
sQNOTQaQmainQbackupQtype?Q-QCORRECTQANSWERQ-Discretionary
, CompareQandQevaluateQtheQmainQcomponentsQinQanQExtensibleQAuthenticationQProtocolQ(EAP).QWhichQsc
enariosQaccuratelyQdifferentiateQbetweenQtheseQcomponents?Q(SelectQallQthatQapply.)Q-
QCORRECTQANSWERQ-
B.QAnQauthenticatorQestablishesQaQchannelQforQtheQsupplicantQandQtheQauthenticationQserverQtoQexchang
eQcredentialsQusingQEAP.
C.QAQsupplicantQrequestsQauthenticationQandQtheQauthenticationQserverQperformsQtheQauthentication.
WhenQaQcompanyQfirstQinstalledQitsQcomputerQinfrastructure,QITQimplementedQrobustQsecurityQcontrols.QA
sQtheQequipmentQages,Qhowever,QthoseQcontrolsQnoQlongerQeffectivelyQmitigateQnewQrisks.QWhichQstatem
entQbestQsummarizesQtheQcompany'sQriskQposture?Q-QCORRECTQANSWERQ-
TheQcompany'sQagingQinfrastructureQconstitutesQaQcontrolQrisk.
AQjuniorQengineerQsuspectsQthereQisQaQbreachedQsystemQbasedQonQanQalertQreceivedQfromQaQsoftwareQmo
nitor.QTheQuseQofQtheQalertQprovidesQwhichQinformationQtoQtheQengineer?Q-QCORRECTQANSWERQ-IoC
AQcompanyQdeploysQanQactiveQdefenseQstrategyQdesignedQtoQdetectQinsiderQmalpractice.QToQrecordQtheQm
aliciousQinsider'sQactions,QtheQsecurityQteamQcreatesQaQconvincing,QyetQfake,QdataQfileQwithQaQtrackerQthatQ
recordsQanyQdataQexfiltrationQattempts.QAnalyzeQtheQsecurityQtoolQandQdetermineQwhatQmethodQtheQsecu
rityQteamQemployed.Q-QCORRECTQANSWERQ-Honeyfile
IdentifyQtheQtypeQofQattackQwhereQmalwareQforcesQaQlegitimateQprocessQtoQloadQaQmaliciousQlinkQlibrary.Q-
QCORRECTQANSWERQ-DLLQinjection
WhileQpreparingQaQdisasterQrecoveryQplan,QmanagementQatQaQcompanyQconsidersQhowQfarQbackQitQcanQall
owQforQtheQlossQofQdata.QWhichQmetricQdoesQmanagementQuseQtoQdescribeQthisQbusinessQessentialQdataQi
nQtermsQofQrecovery?Q-QCORRECTQANSWERQ-RecoveryQpointQobjective
AQtechnologyQfirmQsuffersQaQlarge-
scaleQdataQbreach,QandQtheQcompanyQsuspectsQaQdisgruntledQformerQITQstaffQmemberQorchestratedQtheQb
reachQtoQexfiltrateQproprietaryQdata.QDuringQtheQforensicQinvestigation,QaQhardQdiskQwasQnotQsignedQoutQ
whenQhandled.QExamineQtheQscenarioQandQdetermineQwhatQissueQthisQoversightQisQmostQlikelyQtoQcauseQi
nQtheQinvestigativeQprocess.Q-QCORRECTQANSWERQ-TheQchainQofQcustodyQisQunderQquestion.