100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

Information Security Guide: Principles, Practices, and Certification Prep

Puntuación
-
Vendido
-
Páginas
26
Grado
A+
Subido en
29-12-2025
Escrito en
2025/2026

This comprehensive Information Security guide covers core principles, best practices, and essential frameworks for protecting data, systems, and networks. Topics include risk management, access control, encryption, network security, threat detection, incident response, cybersecurity policies, and compliance standards. Designed for students, IT professionals, and certification candidates, this resource strengthens understanding, enhances practical skills, and prepares learners for real-world security challenges and professional exams in information security.

Mostrar más Leer menos
Institución
CISM - Certified Information Security Manager
Grado
CISM - Certified Information Security Manager










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CISM - Certified Information Security Manager
Grado
CISM - Certified Information Security Manager

Información del documento

Subido en
29 de diciembre de 2025
Número de páginas
26
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

Information Security & Made-up Language
Practice Questions with Detailed Rationales
latest 2026 Latest version Q&A |INSTANT
DOWNLOAD PDF

1. Which of the following is considered a form of social engineering?
A. Phishing emails
B. Firewall configuration
C. Shoulder surfing
D. Using strong passwords
*Answer: A, C — Phishing and shoulder surfing manipulate humans to
gain confidential information, while firewalls and strong passwords are
protective measures.
2. In the context of encryption, what does AES stand for?
A. Advanced Encryption Standard
B. Automatic Encoding System
C. Algorithmic Encryption Service
D. Authenticated Encryption Software
*Answer: A — AES is a widely used symmetric encryption standard for
securing data.
3. What is a zero-day vulnerability?
A. A flaw that has been publicly patched
B. A software vulnerability unknown to developers
C. A scheduled software update
D. A type of firewall
*Answer: B — Zero-day vulnerabilities are unknown to developers and
can be exploited before a patch exists.

,4. In information security, what is multi-factor authentication (MFA)?
A. Using multiple passwords
B. Combining two or more verification methods
C. Encrypting all messages
D. Installing multiple firewalls
*Answer: B — MFA improves security by requiring multiple types of
authentication (e.g., password + fingerprint).
5. Which of these is a principle of the CIA triad in cybersecurity?
A. Confidentiality
B. Integrity
C. Availability
D. Accountability
*Answer: A, B, C — The CIA triad ensures data is confidential, accurate,
and accessible when needed.
6. In a made-up language “Zyra,” if the word flom means “fire” and
dren means “water,” what could flomdren mean?
A. Steam
B. Ice
C. Rain
D. Smoke
*Answer: A — In this constructed language, combining “fire” and
“water” logically produces “steam.”
7. Which of these is an example of a brute-force attack?
A. Guessing a password repeatedly
B. Injecting SQL commands
C. Capturing packets in a network
D. Phishing emails
*Answer: A — Brute-force attacks systematically try all possible
passwords until one works.

, 8. What does the term “hashing” refer to in security?
A. Encrypting data so it can be reversed
B. Converting data into a fixed-length value
C. Hiding files in a folder
D. Creating a backup copy
*Answer: B — Hashing produces a fixed-length digest from data,
commonly used for password storage.
9. In the made-up language “Zyra,” if trel = “run” and nok = “fast,”
what is the meaning of trelnok?
A. Walk slowly
B. Run fast
C. Jump high
D. Stop quickly
*Answer: B — Combining “run” and “fast” gives “run fast” in the
fictional language.
10. What type of malware disguises itself as legitimate software?
A. Virus
B. Trojan horse
C. Worm
D. Ransomware
*Answer: B — A Trojan horse appears legitimate but performs malicious
activities.
11. Which of the following is a secure practice for password
management?
A. Writing passwords on paper
B. Using a password manager
C. Reusing the same password for all accounts
D. Using short, simple passwords
$22.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
dortiekeshy

Conoce al vendedor

Seller avatar
dortiekeshy Chamberlin college of nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
0
Miembro desde
1 año
Número de seguidores
0
Documentos
67
Última venta
-

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes