gd gd gd gd
SECURITY EXAM OBJECTIVE ASSESSMENT
gd gd gd gd
NEWEST 2025/2026 TEST BANK ACTUAL EXAM gd gd gd gd gd
300 QUESTIONS AND CORRECT DETAILED
gd gd gd gd gd
ANSWERS (VERIFIED ANSWERS) |ALREADY
gd gd gd gd
GRADED A+ gd gd
A company wants to update its access control
g d gd g d g d g d g d gd
policy. The company wants to prevent hourly
gd gd gd g d g d g d g d
employees from logging in to company computers
g d gd gd g d g d g d g d
after business hours.
g d g d g d
Which type of access control policy should be
g d gd g d gd gd gd g d
implemented?
gd
A g d Mandatory
B g d Physical
C g d Discretionary
D g d Attribute-based - ...ANSWER...D g d g d
A new software development company has
g d g d gd g d gd
determined that one of its proprietary algorithms
g d gd g d g d g d g d g d
is at a high risk for unauthorized disclosure. The
g d g d g d g d g d gd g d gd g d
company's security up to this point has been fairly
gd g d gd gd g d g d g d g d g d
lax.
gd
Which procedure should the company implement to
g d gd g d g d gd g d
protect this asset?
gd g d g d
A Transfer the algorithm onto servers in the
g d g d g d gd gd g d g d
demilitarized zone.
gd gd
B Store the algorithm on highly available servers.
g d g d g d g d g d g d g d
,C Relocate the algorithm to encrypted storage.
g d g d g d g d g d g d
D Create multiple off-site backups of the algorithm.
g d g d g d g d g d g d g d
-
g d
...ANSWER...C
An accounting firm stores financial data for many
g d gd gd gd gd g d gd
customers. The company policy requires that
gd g d gd gd gd gd
employees only access data for customers they
gd g d gd gd g d g d g d
are assigned to. The company implements a written
gd gd gd g d gd gd g d gd
policy indicating an employee can be fired for
gd gd g d g d g d g d g d g d
violating this requirement.
g d g d gd
Which type of control has the company
g d g d g d g d g d g d
implemented?
g d
A g d Deterrent
B g d Active
C g d Preventive
D g d Detective - ...ANSWER...A g d g d
How can an operating system be
g d g d g d g d g d
hardened in accordance to the principle of
gd g d gd gd g d gd gd
least privilege?
g d g d
A Implement account auditing.
g d g d g d
B Remove unneeded services.
g d g d g d
C Restrict account permissions.
g d g d g d
D Remove unnecessary software. - ...ANSWER...C
g d g d g d g d g d
A company implements an Internet-facing web
g d gd g d g d gd
server for its sales force to review product
g d gd g d g d g d gd g d g d
information. The sales force can also update its
g d g d gd g d gd g d g d gd
profiles and profile photos, but not the product
g d g d gd gd gd g d g d gd
information. There is no other information on this
g d g d gd g d gd gd g d g d
server.
g d
,Which content access permissions should be
g d g d g d g d g d
granted to the sales force based on the principle of
gd gd gd g d g d g d g d g d g d g d
least privilege?
g d g d
A Read and limited write access
g d g d g d g d g d
B Read and write access
g d g d g d g d
C Limited write access only
g d g d g d g d
D Limited read access only - ...ANSWER...A
g d g d g d g d g d g d
A corporation has discovered that some
g d gd g d gd g d
confidential personnel information has been used
gd gd gd g d g d gd
inappropriately.
g d
How can the principle of least privilege be applied to
g d g d gd gd g d g d gd g d g d
limit access to confidential personnel records?
gd g d g d g d gd gd
A Only allow access to those with elevated security
g d gd g d gd g d gd g d g d
permissions.
gd
B Only allow access to department heads and
g d gd g d gd g d g d g d
executives.
gd
C Only allow access to those who need access to
g d gd g d gd g d gd g d g d gd
perform their job.
gd gd g d
D Only allow access to those who work in the human
gd g d g d gd g d gd g d g d g d gd
resources department. - ...ANSWER...C
gd g d g d g d
A user runs an application that has been infected
g d gd gd g d g d g d g d g d
with malware that is less than 24 hours old. The
g d gd gd g d g d gd g d g d g d g d
malware then infects the operating system.
g d gd g d g d gd g d
Which safeguard should be implemented to prevent
g d g d g d gd g d g d
this type of attack?
g d gd gd g d
A Install the latest security
g d g d g d g d
updates.
g d
B Uninstall unnecessary software.
g d g d g d
, C Modify the default user accounts.
g d g d g d g d g d
D Limit user account privileges. - ...ANSWER...D
g d g d g d g d g d g d
A company was the victim of a security breach
g d g d g d g d g d g d g d g d
resulting in stolen user credentials. An attacker used
gd g d g d g d gd gd g d gd
a stolen username and password to log in to an
gd gd g d g d g d g d g d g d g d g d
employee email account.
gd g d gd
Which security practice could have reduced the post-
g d gd gd g d gd g d gd
breach impact of this event?
gd g d gd g d g d
A g d Multi-factor authentication g d
B g d Operating system hardening g d g d
C g d Network segmentation g d
D g d Mutual authentication - ...ANSWER...A
g d g d g d
A module in a security awareness course shows a
g d gd g d g d gd g d gd g d
user making use of two-factor authentication using
g d gd g d gd g d g d g d
a hardware token.
g d gd gd
Which security failure is being addressed by this
g d gd gd g d g d g d g d
training module?
gd g d
A g d Tailgating
B g d Pretexting
C g d Malware infections g d
D g d Weak passwords - ...ANSWER...D
g d g d g d
Which tool should an application developer use to
g d gd g d g d g d gd gd
help identify input validation vulnerabilities?
g d gd gd gd g d
A scanner
g d