- C836 Questions with Detailed Verified
Answers | Latest Update 2025 | Sure to Pass!!
1.Which act regulates the United Sates department of
education? - ANSWER ✔ FERPA - This protects the privacy
of student records
2.Which act regulates federal departments in the United States?
- ANSWER ✔ FISMA - Mandates government agencies to
protect information systems.
3.Which act regulates customer privacy in the finance industry?
- ANSWER ✔ GLBA - The GLBA requires financial
institutions to explain information sharing practices.
4.Which act regulates reporting of publicly traded companies? -
ANSWER ✔ SOX - mandates certain practices for financial
record keeping.
,5.What is one of the three states of data? - ANSWER ✔ Data in
motion, use, and rest are 3 states of data.
6.Which type of algorithm is a symmetric key? - ANSWER ✔
DES is a block cipher symmetric algorithm.
7.Which type of algorithm is an asymmetric key? - ANSWER
✔ ECC - It's an example of public key cryptography based on
elliptic curves over infinite fields.
8.Which two types of algorithms are hashing algorithms?
Choose two answers. - ANSWER ✔ MD5 , SHA Are both
examples of a hashing algorithm
9.Which algorithm supports encryption for email? - ANSWER
✔ PGP is an email program that supports encryption (Pretty
Good Privacy).
10. Which term refers to the process of gathering and analyzing
information to support business decisions? - ANSWER ✔
, Competitive intelligence is the process of intelligence
gathering and analysis to support business decisions.
11. What is the correct order of steps in the Operations Security
Process? - ANSWER ✔ Identification of critical information;
Analysis of threats; Analysis of vulnerabilities; Assessment of
risks; Application of countermeasures.
12. What describes vulnerability analysis? - ANSWER ✔ The
identification of weaknesses that can be used to cause harm.
13. What is the weakest link in a security program? -
ANSWER ✔ People
14. Which type of attack is conducted on people to gather
information? - ANSWER ✔ Social Engineering
15. Which type of data is collected by law enforcement agents
without using technology as its primary tool? - ANSWER ✔
Human intelligence