DoD & CompTIA-Aligned Concepts | Complete 80-Question Set
1. If you suspect that your computer is infected with fake antivirus software,
what is the best immediate action to take?
Reboot the computer without taking any action.
Ignore the alerts and continue using the computer.
Install additional antivirus programs to combat the issue.
Uninstall the suspicious software and run a legitimate antivirus
scan.
2. If an organization requires personnel to have IAM level III certification,
which of the following actions should they take regarding training and
certification?
Focus solely on practical experience without any formal
certification requirements.
Ensure that personnel obtain the Security+ certification as part
of their training for IAM level III.
Only provide training on advanced cybersecurity topics without
focusing on certifications.
Require personnel to have no certifications for IAM level III roles.
3. According to AR 25-2, who is responsible for ensuring that users receive
initial and annual IA awareness training?
CISO
,End Users
IASO
System Administrator
, 4. Describe the differences between viruses, worms, and Trojan horses in
terms of their behavior and impact on computer systems.
Viruses are self-replicating, worms require user action, and Trojan
horses are harmless.
Viruses are used for data encryption, worms for network attacks,
and Trojan horses for system monitoring.
Viruses attach themselves to legitimate programs, worms
replicate independently, and Trojan horses disguise themselves
as legitimate software.
All three types behave the same way and have the same impact.
5. If an organization fails to provide initial and annual IA awareness training
as mandated by AR 25-2, what potential consequences could arise?
Reduction in cybersecurity costs
Enhanced data encryption practices
Increased vulnerability to security incidents
Improved user compliance with security policies
6. If a company discovers a rootkit on its servers, what immediate action
should be taken to mitigate potential damage?
Increase the server's encryption levels without further
investigation.
Ignore the rootkit as it does not pose a threat.
Initiate an incident response plan to remove the rootkit and
assess the extent of the breach.
Reboot the servers to clear any temporary files.
7. Why is a denial-of-service attack (DoS attack) a threat to data availability?