EXAM OBJECTIVE ASSESSMENT NEWEST 2024-2025 TEST
BANK ACTUAL EXAM 300 QUESTIONS AND CORRECT
DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY
GRADED A+
Which protection technique should the IT firm employ to satisfy this requirement?
RAID
A Data encryption
B Certificates
C File encryption - answer-D
A company has files stored on a server that are critical to the organization's viability. The administrator
has assigned the appropriate permissions to the files.
How should the administrator provide additional confidentiality protection for the files at rest?
File compression
A Network encryption
B Network compression
C File encryption - answer-D
Which security solution can an organization deploy to prevent unauthorized external access to its
internal network?
VPN
A Sniffer
B Firewall
C IDS - answer-C
A restaurant needs to protect its customers' credit card information.
Which security standard should the restaurant follow?
FISMA
,A PCI DSS
B SOX
C FERPA - answer-B
In addition to a username and corresponding password, a desktop application asks users to submit a
special code. This code is produced by an application running on the users' mobile phone.
Which authentication technique is the phone application providing?
Something you have
A Something you are
B Something you know
C Something you do - answer-A
Employees are required to swipe their access cards and then to use an iris scanner to access protected
areas in the company's data center.
Which two authentication techniques are used to protect the data center?
Something you have and something you are
A Something you know and something you do
B Something you do and something you are
C Something you have and something you know - answer-A
A health company must comply with HIPAA regulations. It decides to encrypt databases that contain
HIPAA information.
Which resource is the health company directly trying to protect?
Operating system
A Server
B Data
C Application - answer-C
,A file is stored in a marketing folder and is accessible only to members of the marketing group. An
attacker uses a phishing scam to gain the credentials of a user who is a member of the marketing group,
and then reads the file.
Which leg of the CIA triad is being targeted?
Control
A Integrity
B Availability
C Confidentiality - answer-D
An attacker performs a buffer overflow attack on an organization's web server. The web server locks up
and must be restarted to restore functionality.
Which part of the CIA triad is under attack?
Confidentiality
A Integrity
B Control
C Availability - answer-D
Some malware hides itself by replacing some system administrator commands on a server, but the server
continues to function normally for its users.
Which component of the CIA triad has been compromised?
Confidentiality
A Integrity
B Availability
D Authenticity - answer-B
Which component of the CIA triad will be impacted if an attacker cuts network cables?
Availability
A Confidentiality
, B Authenticity
C Integrity - answer-A
A bank wants to ensure user interactions with the online banking website are confidential.
Which security solution should be implemented?
SSH/FTP
A AES
B SSL/TLS
C VPN - answer-C
What is an example of symmetric key encryption?
MD5
A RSA
B AES
C ECC - answer-C
Which asymmetric cryptographic algorithm can provide confidentiality for data in motion?
AES
A MD5
B RSA
C 3DES - answer-C
A company has just completed an audit of disaster protection strategies. The company has decided it
must keep and be able to retrieve backup data for a period of 30 years. The company has implemented
tape backups using 8mm digital audio tapes.
Which factor could impact the company's ability to access information from the backup tapes?
Tape access speed
A Technical obsolescence