COMPREHENSIVE STUDY GUIDE DATA
SECURITY SYSTEM OPERATIONS 2026
QUESTIONS WITH SOLUTIONS GRADED A+
⩥ corrective controls. Answer: Controls put in place to immediately halt
an activity from continuing.
⩥ countermeasure. Answer: Any action, method, or device that reduces
the likelihood of a threat exploiting a vulnerability. A countermeasure
may mitigate a specifically identified threat or a certain vulnerability. A
countermeasure is usually a type of control put in place as the result of a
risk analysis.
⩥ differential backup. Answer: A data backup strategy in which periodic
(such as daily) transactions are appended to a file consisting of all
transactions since the last full backup. Differential backups are relatively
fast to restore since only one backup file must be appended to the last
full backup in order to restore data.
⩥ directive controls. Answer: Controls put in place to enforce the
policies of the organization. Directive controls are usually warnings.
,⩥ disaster recovery plan (DRP). Answer: An established plan detailing
steps that will be taken to restore a business or data processing
environment to the condition it was prior to a disaster event.
⩥ forensics. Answer: The science of examining an incident scene,
including the collection and analysis of evidence, the determination of
conclusions based upon the nature of the evidence, and the reporting of
findings or providing expert opinion.
⩥ hot site. Answer: A physical data processing location that maintains a
similar or duplicate set of the company's networking equipment.
Applications and data must be restored prior to use.
⩥ incremental backup. Answer: A backup strategy in which daily
transactions are maintained in an individual file for that day. To restore
files, each daily file must be appended to the last full backup.
⩥ inference. Answer: Coming to a conclusion concerning sensitive
information based upon observing available information.
⩥ live evidence. Answer: Live evidence is a forensic investigation term
that refers to data that is currently located in primary volatile memory
such as the RAM memory of the PC. If the power is disrupted, the RAM
memory will disappear.
, ⩥ load balancing. Answer: The distribution of a workload among
various devices, most specifically servers, based on preset rules or traffic
monitoring techniques.
⩥ Locard's exchange principle. Answer: A principle that states that at
any crime scene something is left behind and something is taken by the
perpetrator.
⩥ mirror site. Answer: A physical backup location that contains mirrored
data and may be immediately brought online.
⩥ negative testing. Answer: Use case or abuse case testing of
applications to determine all possible actions the application may
perform during an attack or abuse.
⩥ preventative controls. Answer: Controls put in place to reduce the
opportunity for a threat to exploit a vulnerability.
⩥ 3DES, Triple DES. Answer: A symmetric encryption algorithm that
uses either two (key 1 and key 3are the same) or three keys and
improves upon the Data Encryption Standard algorithm.
⩥ Advanced Encryption Standard (AES). Answer: A symmetric block
algorithm selected by NIST to be used as a standard by the U.S.
government.