FedVTE Enterprise Cybersecurity Operations Exam
COMPREHENSIVE questions answered, 2025 verified
graded A+ already passed!
The internal audit department is investigating a possible accounting breach. One
of the auditors is sent to interview the following employees: Employee A works in
the accounts receivable office and is in charge of entering data into the finance
system; Employee B works in the accounts payable office and is in charge of
approving purchase orders; Employee C is the manager of the finance
department, supervises Employee A and Employee B, and can perform the
functions of both Employee A and Employee B. Which of the following should the
auditor suggest be done to avoid future security breaches? - ...(ANSWERS)....The
manager should only be able to review the data and approve purchase orders.
The acronym VPN stands for: - ...(ANSWERS)....Virtual Private Network
Executives are responsible for managing and overseeing enterprise risk
management. - ...(ANSWERS)....True
An electrical utility has employed a consultant to perform a controls assessment
of the personnel system, backend business operations, and the SCADA system
used in their facility. Which of the following correctly states the risk management
options that the consultant should use during the assessment? -
...(ANSWERS)....Avoid, transfer, mitigate, and accept.
The acronym SOA stands for: - ...(ANSWERS)....Statement of Applicability
, Which of the following are steps in the risk management process? -
...(ANSWERS)....All of the Above
Cybersecurity should be involved throughout the entire system development life
cycle. - ...(ANSWERS)....True
A Physical Security Manager is ready to replace 30 analog surveillance cameras
with IP cameras with built in web management. There are several security guard
desks on different networks that must be able to view the cameras without
unauthorized people viewing the video as well. The selected IP camera vendor
does not have the ability to authenticate users at the camera level. Which of the
following should be used to BEST secure this environment? -
...(ANSWERS)....Create an IP camera network and deploy a proxy to authenticate
users prior to accessing the cameras.
What is an advantage of cloud computing? - ...(ANSWERS)....Improved
performance
Cybersecurity is primarily about implementing a checklist of requirements. -
...(ANSWERS)....False
A retail merchant has had a number of issues in regards to the integrity of
sensitive information across all of its customer databases. This has resulted in the
merchants share price decreasing in value by more than one third and the
merchant has been threatened with losing their ability to process credit card
transactions. The new Chief Information Security Officer (CISO) as a result has
initiated a program of work to solve the issues. The business has specified that
the solution needs to be enterprise grade and meet the following requirements:
COMPREHENSIVE questions answered, 2025 verified
graded A+ already passed!
The internal audit department is investigating a possible accounting breach. One
of the auditors is sent to interview the following employees: Employee A works in
the accounts receivable office and is in charge of entering data into the finance
system; Employee B works in the accounts payable office and is in charge of
approving purchase orders; Employee C is the manager of the finance
department, supervises Employee A and Employee B, and can perform the
functions of both Employee A and Employee B. Which of the following should the
auditor suggest be done to avoid future security breaches? - ...(ANSWERS)....The
manager should only be able to review the data and approve purchase orders.
The acronym VPN stands for: - ...(ANSWERS)....Virtual Private Network
Executives are responsible for managing and overseeing enterprise risk
management. - ...(ANSWERS)....True
An electrical utility has employed a consultant to perform a controls assessment
of the personnel system, backend business operations, and the SCADA system
used in their facility. Which of the following correctly states the risk management
options that the consultant should use during the assessment? -
...(ANSWERS)....Avoid, transfer, mitigate, and accept.
The acronym SOA stands for: - ...(ANSWERS)....Statement of Applicability
, Which of the following are steps in the risk management process? -
...(ANSWERS)....All of the Above
Cybersecurity should be involved throughout the entire system development life
cycle. - ...(ANSWERS)....True
A Physical Security Manager is ready to replace 30 analog surveillance cameras
with IP cameras with built in web management. There are several security guard
desks on different networks that must be able to view the cameras without
unauthorized people viewing the video as well. The selected IP camera vendor
does not have the ability to authenticate users at the camera level. Which of the
following should be used to BEST secure this environment? -
...(ANSWERS)....Create an IP camera network and deploy a proxy to authenticate
users prior to accessing the cameras.
What is an advantage of cloud computing? - ...(ANSWERS)....Improved
performance
Cybersecurity is primarily about implementing a checklist of requirements. -
...(ANSWERS)....False
A retail merchant has had a number of issues in regards to the integrity of
sensitive information across all of its customer databases. This has resulted in the
merchants share price decreasing in value by more than one third and the
merchant has been threatened with losing their ability to process credit card
transactions. The new Chief Information Security Officer (CISO) as a result has
initiated a program of work to solve the issues. The business has specified that
the solution needs to be enterprise grade and meet the following requirements: