Verified Answers | Already Graded A+
Chad is a security practitioner tasked with ensuring that the information on
the organization's public website is not changed by anyone outside the
organization. This task is an example of ensuring _________. (D1, L1.1.1)
A)
Confidentiality
B)
Integrity
C)
Availability
D)
Confirmation - 🧠ANSWER ✔✔B is correct. Preventing unauthorized
modification is the definition of integrity. A is incorrect because the website
is not meant to be secret; it is open to the public. C is incorrect because
COPYRIGHT©JOSHCLAY 2025/2026. YEAR PUBLISHED 2025. COMPANY REGISTRATION NUMBER: 619652435. TERMS OF USE. PRIVACY
1
STATEMENT. ALL RIGHTS RESERVED
,Chad is not tasked with ensuring the website is accessible, only that the
information on it is not changed. D is incorrect because "confirmation" is
not a typical security term, and is used here only as a distractor.
Druna is a security practitioner tasked with ensuring that laptops are not
stolen from the organization's offices. Which sort of security control would
probably be best for this purpose? (D1, L1.3.1)
Question options:
A)
Technical
B)
Obverse
C)
Physical
D)
Administrative - 🧠ANSWER ✔✔C is the best answer. Because laptops are
tangible objects, and Druna is trying to ensure that these objects are not
moved from a certain place, physical controls are probably best for the
COPYRIGHT©JOSHCLAY 2025/2026. YEAR PUBLISHED 2025. COMPANY REGISTRATION NUMBER: 619652435. TERMS OF USE. PRIVACY
2
STATEMENT. ALL RIGHTS RESERVED
,purpose. A is incorrect; technical controls might help detect an attempt to
steal a laptop, or locate the laptop after it has been stolen, but won't
prevent the laptop from being taken. B is incorrect; "obverse" is not a term
commonly used to describe a particular type of security control, and is used
here only as a distractor. D is incorrect; administrative controls may help
reduce theft, such as ensuring that laptops are not left in a place
unobserved, but won't prevent the laptop from being taken.
Which of the following is an example of a "something you know"
authentication factor? (D1, L1.1.1)
Question options:
A)
User ID
B)
Password
C)
Fingerprint
D)
COPYRIGHT©JOSHCLAY 2025/2026. YEAR PUBLISHED 2025. COMPANY REGISTRATION NUMBER: 619652435. TERMS OF USE. PRIVACY
3
STATEMENT. ALL RIGHTS RESERVED
, Iris scan - 🧠ANSWER ✔✔B is correct. A password is something the user
knows and can present as an authentication factor to confirm an identity
assertion. A is incorrect because a user ID is an identity assertion, not an
authentication factor. C and D are incorrect as they are examples of
authentication factors that are something you are, also referred to as
"biometrics."
Which of the following is an example of a "something you are"
authentication factor? (D1, L1.1.1)
Question options:
A)
A credit card presented to a cash machine
B)
Your password and PIN
C)
A user ID
D)
COPYRIGHT©JOSHCLAY 2025/2026. YEAR PUBLISHED 2025. COMPANY REGISTRATION NUMBER: 619652435. TERMS OF USE. PRIVACY
4
STATEMENT. ALL RIGHTS RESERVED