Test. Questions with Correct Verified
Answers 2025-2026. Graded A
A data breach is an example of a: - ANS
A. Vulnerability
B. Threat event (Answer)
C. Threat actor
D. Risk
A security incident and event management (SIEM) system should do which
of the following? (Select all that apply) - ANSA. Capture security events
B. Analyze security events (Answer)
C. Alert based on anomalies (Answer)
D. Alert based on threshold and correlation analysis (Answer)
A set of performance measures organized into four categories describes a:
- ANSA. Balanced scorecard. (Answer)
B. Capability maturity model integration.
C. COBIT 5.
D. ISO 27004:2009.
Configuration Management needs to cover what technology used by an
organization? - ANSInfrastructure components, like:
- Virtualization infrastructure
1
, - Operating systems
- Web / application server engines
- Database management systems
- Infrastructure services (e.g., mail, file sharing environments)
- Security Services (e.g., Active Directory)
Network components, like:
- Firewall; routers; switches
Client endpoints
IoT technology
Cybersecurity controls are related to which of the following network
environments? - ANSA. The Internet network
B. Internet network
C. Wireless networks
D. Business partner connections
E. All of the above (Answer)
Cybersecurity is focused on protection of information assets from loss of: -
ANSA. Confidentiality
B. Integrity
C. Availability
D. All of the above (Answer)
During the security evaluation of a cloud service provider, an organization
wants an independent perspective on the effectiveness of the provider's
control environment. Which of the following would be the BEST option for
the organization to use? - ANSA. BITS Shared Assessment Program
2