INFORMATION SECURITY EXAM WITH
VERIFIED QUESTIONS AND ANSWERS||
ALREADY GRADED A+|| GUARANTEED PASS||
LATEST UPDATE 2025
The science of breaking through encryption is known as _____.
A Cryptology
B Cryptography
C Cryptanalysis
D Ciphertext - ANSWER-C
We are somewhat limited in our ability to protect which type of data?
A Data in use
B Data at rest
C Data in motion - ANSWER-A
Some standards are not mandated by law but are managed and enforced by the
industry, often via a council or committee. Which of the options below is an
example of this industry compliance?
A FISMA
,B PCI DSS
C SOX
D HIPAA
E GLBA - ANSWER-B
The Interception attack type most commonly affects which principle(s) of the
CIA triad?
A Integrity and Availability
B Confidentiality and Integrity
C Availability
D Integrity
E Confidentiality - ANSWER-E
The Fabrication attack type most commonly affects which principle(s) of the
CIA triad?
A Availability
B Integrity
C Confidentiality
D Integrity and Availability
E Confidentiality and Integrity - ANSWER-D
Controls that protect the systems, networks, and environments that process,
transmit, and store our data are called _______.
A Physical controls
B Logical controls
,C Administrative controls - ANSWER-B
During what phase of the incident response process do we determine what
happened, why it happened, and what we can do to keep it from happening
again?
A Containment
B Detection and Analysis
C Preparation
D Post-incident Activity
E Recovery - ANSWER-D
The biometric characteristic that measures how well a factor resists change over
time and with advancing age is called __________.
A Collectability
B Acceptability
C Universality
D Uniqueness
E Permanence - ANSWER-E
What type of authentication can prevent a man-in-the-middle attack?
A Something you know
B Something you are
C Something you do
D Multifactor
E Mutual - ANSWER-E
, A badge or token is considered what type of authentication?
A Something you are
B Something you have
C Something you know
D Where you are
E Something you do - ANSWER-B
______ sets limits on the use and disclosure of patient information and grants
individuals rights over their own health records.
A HIPAA
B SOX
C GLBA
D FERPA
E PCI DSS - ANSWER-A
Which software development vulnerability occurs when multiple processes
control or share access to a particular resource, and the correct handling of that
resource depends on the proper ordering or timing of transactions?
A Authentication attacks
B Input validation attacks
C Race conditions
D Buffer overflows
E Authorization attacks - ANSWER-C