CSIA STUDY GUIDE SECURITY FINAL EXAM VERIFIED
QUESTIONS WITH CORRECT ANSWERS (2025/2026)
Which type of monitoring methodology uses a baseline?
ANSWER->Anomaly-based
SNMP can be found on which of the following devices? Select
all that apply. -ANSWER->Routers
Fax machines
Switches
UPSs
, Which type of encryption technology is utilized with WPA?
ANSWER->TKIP
Which of the following terms does NOT represent part of a
digital certificate life cycle? -ANSWER->Reinstatement
The current Bluetooth Low Energy version number is
. -ANSWER->V4.0
SMTP server listens on port and POP3 listens on port
. -ANSWER->25 & 110
A policy that defines what users may and may not do while
accessing systems and networking equipment would be which
of the following? -ANSWER->AUP
Which of the following DLP states is data being used by
"endpoint devices"? -ANSWER->Data in Use
How many bits interface is found on the enhanced PC card
called the CardBus? -ANSWER->32 bit
QUESTIONS WITH CORRECT ANSWERS (2025/2026)
Which type of monitoring methodology uses a baseline?
ANSWER->Anomaly-based
SNMP can be found on which of the following devices? Select
all that apply. -ANSWER->Routers
Fax machines
Switches
UPSs
, Which type of encryption technology is utilized with WPA?
ANSWER->TKIP
Which of the following terms does NOT represent part of a
digital certificate life cycle? -ANSWER->Reinstatement
The current Bluetooth Low Energy version number is
. -ANSWER->V4.0
SMTP server listens on port and POP3 listens on port
. -ANSWER->25 & 110
A policy that defines what users may and may not do while
accessing systems and networking equipment would be which
of the following? -ANSWER->AUP
Which of the following DLP states is data being used by
"endpoint devices"? -ANSWER->Data in Use
How many bits interface is found on the enhanced PC card
called the CardBus? -ANSWER->32 bit