Objective 1: General Security Concepts Flashcards

(220 cards)

1
Q

Which of the following BEST describes the purpose of security controls?

A. To eliminate all security risks
B. To minimize impact and limit damage from security events
C. To guarantee 100% system uptime
D. To remove the need for security training

A

Answer: B — Security controls minimize impact and limit damage.

Explanation: Security controls cannot remove all risks or guarantee uptime. Their main function is to reduce risk exposure and limit the impact if a security event occurs.

Memory Trick: “Control the damage, don’t chase perfection.”

(Your notes: “Prevent security events, minimize the impact, and limit the damage.”)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which security control category includes firewalls and operating system security?
A. Managerial
B. Technical
C. Operational
D. Physical

A

Answer: B — Technical controls.
(Your notes: “Technical controls – OS controls, firewalls, antivirus.”)

Explanation: Technical controls are software or hardware mechanisms used to enforce security (like firewalls, antivirus, encryption).

Memory Trick: “Tech = Tools & Tech stuff.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security awareness programs fall under which type of control?

A. Technical
B. Managerial
C. Operational
D. Compensating

A

Answer: C — Operational controls.
(Your notes: “Operational controls – implemented by people… awareness programs.”)

Explanation: Operational controls are people-based processes that implement security policies, such as training, procedures, or incident handling.

Memory Trick: “Operations = what people actually do.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is a physical control?
A. Review login reports
B. Badge readers
C. System logs
D. Security policies

A

Answer: B — Badge readers.
(Your notes: “Physical controls – fences, locks, badge readers.”)

Explanation: Physical controls protect the physical environment (doors, locks, fences, badges). They limit physical access rather than system access.

Memory Trick: “Physical = you can touch it.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A control designed to block access before an event occurs is known as:

A. Detective
B. Corrective
C. Preventive
D. Directive

A

Answer: C — Preventive control.
(Your notes: “Preventive — Block access to a resource.”)

Explanation: Preventive controls stop incidents before they happen, like firewalls, locks, and access restrictions.

Memory Trick: “Preventive = Stop it before it starts.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which control type is meant to discourage an intrusion attempt but not prevent access?

A. Preventive
B. Deterrent
C. Compensating
D. Corrective

A

Answer: B — Deterrent.
(Your notes: “Deterrent — Discourage an intrusion attempt.”)

Explanation: Deterrent controls discourage or warn attackers but do not physically stop access (like warning signs or splash screens).

Memory Trick: “Deterrent = Don’t dare try it.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

System logs, motion detectors, and reviewing login reports are examples of which control type?

A. Detective
B. Preventive
C. Physical
D. Directive

A

Answer: A — Detective controls.
(Your notes: “Detective — Identify and log an intrusion attempt.”)

Explanation: Detective controls identify and record incidents, helping organizations spot breaches after they occur.

Memory Trick: “Detective = Detect and document.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Front:
Which control type applies after an event to minimize downtime and restore operations?

A. Directive
B. Corrective
C. Deterrent
D. Operational

A

Answer: B — Corrective.
(Your notes: “Corrective — Apply a control after an event… restoring from backups.”)

Explanation: Corrective controls fix problems after they happen, like restoring from backups.

Memory Trick: “Corrective = Correct the problem after it occurs.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A company uses a generator after a power outage because existing controls were not enough. This is an example of:

A. Compensating control
B. Preventive control
C. Corrective control
D. Directive control

A

Answer: A — Compensating control.
(Your notes: “Compensating… used when existing controls aren’t sufficient… generator after power outage.”)

Explanation: Compensating controls fill gaps when primary controls are insufficient. A generator is a temporary solution to maintain operations.

Memory Trick: “Compensating = covering for what’s missing.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Posting a sign that says “Authorized Personnel Only” is an example of:

A. Compensating control
B. Directive control
C. Corrective control
D. Managerial control

A

Answer: B — Directive control.
(Your notes: “Directive — Post a sign for ‘Authorized Personnel Only.’”)

Explanation: Directive controls guide behavior through rules, signage, or policies.

Memory Trick: “Directive = Direct people on what to do.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the CIA Triad stand for?

A. Control, Integrity, Authentication
B. Confidentiality, Integrity, Availability
C. Confidentiality, Identification, Access
D. Control, Identity, Availability

A

Answer: B — Confidentiality, Integrity, Availability.

Explanation: CIA Triad = core principles of information security.

Memory Trick: “CIA = Keep secrets, accurate data, available systems.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which principle ensures information is only accessible to authorized users?

A. Integrity
B. Availability
C. Confidentiality
D. Authentication

A

Answer: C — Confidentiality.
(Your notes: “Prevent disclosure to unauthorized individuals.”)

Explanation: Confidentiality prevents unauthorized disclosure.

Memory Trick: “Confidential = keep secrets safe.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which method BEST supports confidentiality?

A. Hashing
B. Encryption
C. Backup recovery
D. Redundancy

A

Answer: B — Encryption.
(Your notes: “Encode messages so only certain people can read it.”)

Explanation: Encryption scrambles data so only authorized users can read it.

Memory Trick: “Encrypt = secret code.”

B. Encryption ✅

Explanation:

Confidentiality means keeping information private and only accessible to authorized users.

Encryption converts data into a coded format that only someone with the correct key can read, directly supporting confidentiality.

Why the other options are incorrect:

A. Hashing ❌

Hashing ensures integrity (verifying data hasn’t changed), not confidentiality.

Hashes are one-way; they don’t hide the original data for privacy.

C. Backup recovery ❌

Backup recovery supports availability, ensuring data can be restored after loss. It doesn’t protect secrecy.

D. Redundancy ❌

Redundancy (duplicate systems or storage) also supports availability, not confidentiality.

Mnemonic:

“Encryption = Locking data away for authorized eyes only.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which concept ensures data is not modified without detection?

A. Integrity
B. Confidentiality
C. Availability
D. Non-repudiation

A

Back:
Answer: A — Integrity.
(Your notes: “Messages can’t be modified without detection.”)

Explanation: Integrity guarantees data accuracy and signals tampering.

Memory Trick: “Integrity = stays intact.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Digital signatures and hashing mainly support which part of the CIA Triad?

A. Availability
B. Confidentiality
C. Integrity
D. Authentication

A

Answer: C — Integrity.
(Your notes: “Hashing… Digital signatures verify integrity of data.”)

Explanation: Digital signatures & hashing verify data has not changed.

Memory Trick: “Sign + hash = prove unchanged.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Ensuring systems are always accessible to authorized users is part of:

A. Integrity
B. Confidentiality
C. Availability
D. Validity

A

Answer: C — Availability.
(Your notes: “Information is accessible… Always at your fingertips.”)

Explanation: Availability ensures systems are usable when needed.

Memory Trick: “Available = always at your fingertips.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which method supports availability?

A. Certificates
B. Redundancy
C. Hashing
D. Two-factor authentication

A

Answer: B — Redundancy.
(Your notes: “Redundancy — Build services that will always be available.”)

Explanation: Redundancy keeps services running if one system fails.

Memory Trick: “Redundant = backup ready.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which statement BEST describes why security controls are needed?

Which statement BEST describes why security controls are needed?

A. Because all security systems are perfect
B. To prevent security events, minimize impact, and limit damage
C. To eliminate physical assets
D. To remove the need for security policies

A

Answer: B — Security controls minimize impact and limit damage.

Explanation: Non-repudiation prevents denial of an action (e.g., signing a digital document).

Memory Trick: “Non-repudiation = can’t deny you did it.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Assets protected by security controls include:

A. Only financial data
B. Only physical property
C. Only computer systems
D. Data, physical property, and computer systems

A

Answer: D — All three are assets.

xplanation: Security controls protect all types of assets — not just digital systems. This includes:

Data (confidentiality, backups, access control)

Physical property (locks, guards, cameras)

Computer systems (firewalls, encryption, monitoring)
Security is holistic: it covers everything the organization values.
Memory Trick:
Think “D = the whole Deal” — Data, Devices, and Doors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which is a characteristic of managing security controls?

A. There is only one correct control for each environment
B. All organizations use identical controls
C. Some controls exist in multiple categories
D. Controls never overlap

A

Answer: C — Some controls apply to multiple categories.

xplanation:
Security controls can belong to more than one category or control type depending on how they are used.
Example:

A badge reader is physical and preventive.

Security training is operational and directive.

This flexibility is normal because environments differ, risks change, and controls often overlap to strengthen defense-in-depth.

Memory Trick:
Think “C = Controls can combine.”
Controls don’t fit in a single box — they overlap and support each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which category includes “operating system controls” and “firewalls”?

A. Technical
B. Managerial
C. Operational
D. Physical

A

Answer: A — Technical controls.

Explanation:
Technical controls are technology-based protections implemented through hardware, software, or system configurations.
Examples include:

Firewalls

Operating system security settings

Access control lists (ACLs)

Antivirus software

They work by controlling digital access and system behavior, not by relying on people or physical protections.

Memory Trick:
“Tech = Tools.”
If it runs on software or hardware → it’s Technical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Security policies and standard operating procedures are what type of control?

A. Managerial
B. Technical
C. Operational
D. Compensating

A

Answer: A — Managerial controls.

Explanation:
Managerial controls are high-level, administrative, and governance-based controls created by leadership to guide the organization’s security posture.
Security policies and SOPs:

Define rules

Provide oversight

Direct staff behavior

Establish expectations for security processes

They don’t involve technology or physical tools—they involve management decisions and documentation.

Memory Trick:
“Managers make the rules.”
If it’s a policy, procedure, or governance document → it’s Managerial.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which control category is implemented by people instead of systems?

A. Technical
B. Managerial
C. Operational
D. Physical

A

Answer: C — Operational controls.

Explanation:

Operational controls are implemented by people, not automated systems.
These include processes, procedures, awareness training, incident response, and general day-to-day security activities performed by staff.

Why the others are incorrect:

A. Technical – Implemented by technology or systems (e.g., firewalls, encryption, IDS).

B. Managerial – High-level oversight controls like risk assessments, policies, and planning.

D. Physical – Controls you can touch, like locks, fences, cameras, guards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Limiting physical access through fences, locks, or guard shacks is what category?

A. Operational
B. Physical
C. Technical
D. Managerial

A

Answer: B — Physical controls.

Explanation (Why this answer is correct):

Physical controls are security measures you can touch—they prevent or deter physical access to buildings, rooms, or equipment.

Fences, locks, guard shacks, security guards, doors, lighting, and cameras all fall under physical controls.

Why the other types are incorrect:

Technical: Implemented by systems (e.g., firewalls, encryption).

Managerial: High-level administrative controls like policies, risk assessments.

Operational: Human-executed processes like training, incident response, change management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Preventive controls are primarily designed to: A. Detect an intrusion B. Block access to a resource C. Report security issues D. Discourage attacks
Answer: B — Preventive = block access. ✅ Explanation (Why the answer is B): Preventive controls are designed to stop something bad from happening before it occurs. They block, prevent, or prohibit unauthorized access or actions. Examples: Firewalls blocking traffic Locks preventing entry Access control lists stopping unauthorized users Password requirements preventing unauthorized logins Preventive = “STOP IT BEFORE IT STARTS.” 🧠 Memory Trick: Think “PREVENT = PRE-VENT” → venting a problem before it happens. Or: “Preventive = The Shield” (shields block things). ❌ Why the Other Answers Are Incorrect: A. Detect an intrusion — Incorrect That is a Detective control (e.g., IDS, logs). It finds problems, it doesn’t stop them. C. Report security issues — Incorrect Reporting is the job of Detective (alerts) or sometimes Corrective controls. Again—it happens after, not before. D. Discourage attacks — Incorrect That describes a Deterrent control (signs, warnings, cameras). Deterrents don’t block—they influence behavior. If you want, I can format this as a flashcard like the others!
26
Which of the following is an example of a preventive control? A. Reviewing system logs B. Firewall rules C. Warning signs D. Fire extinguisher
Answer: B — Firewall rules are preventive. ✅ Explanation (Why the answer is B): Firewall rules block unauthorized traffic before it reaches a system. That makes them a Preventive control because they stop an attack or unauthorized access in advance. Preventive = Controls that proactively block or restrict actions. Examples: ACLs Password requirements Locked doors Firewalls Encryption (prevents data disclosure) 🧠 Memory Trick: Think: “Firewalls wall off threats.” Walls prevent things from getting in. Or: Preventive = PROACTIVELY PROTECT. ❌ Why the Other Answers Are Incorrect: A. Reviewing system logs — Incorrect This is a Detective control. Logs reveal what already happened; they don’t stop it. C. Warning signs — Incorrect These are Deterrent controls. They discourage but do not prevent or block. D. Fire extinguisher — Incorrect This is a Corrective control. It fixes or reduces impact after an incident (a fire) occurs.
27
“You shall not pass” applies to which type of control? A. Corrective B. Preventive C. Deterrent D. Compensating
Answer: B — Preventive control slogan. ✅ Explanation (Why the answer is B): “You shall not pass” means you are being stopped before you can get through. That is exactly what a Preventive control does — it blocks, restricts, or prevents an action from occurring. Examples of preventive controls: Firewalls Door locks Access control lists Security gates Preventive = Stops the bad thing before it happens. 🧠 Memory Trick: Think of Gandalf with his staff: “You shall not pass!” = STOP BEFORE ENTRY → Preventive. Preventive = Proactive Protection. ❌ Why the Other Options Are Incorrect: A. Corrective — Incorrect Corrective controls fix problems after they happen (e.g., backups, patches). Gandalf isn’t fixing anything — he’s blocking entry. C. Deterrent — Incorrect Deterrents discourage behavior but don’t stop it. A sign that says “Don’t pass” is deterrent; physically blocking is preventive. D. Compensating — Incorrect Compensating controls are alternatives when the preferred control can’t be used. Nothing in the phrase suggests an alternate safeguard.
28
Deterrent controls: A. Block access B. Detect attacks C. Discourage attempts D. Automatically restore service
Answer: C — Deterrent discourages an attempt. ✅ Explanation (Why the answer is C): Deterrent controls don’t physically block or fix anything—they influence behavior by making potential attackers think twice. Examples of deterrent controls: Warning signs (“Authorized Personnel Only”) Splash screens (“All activity is monitored”) Visible security cameras Security uniforms Deterrent = Psychological barrier, not a physical one. 🧠 Memory Trick: Think: “D = Don’t do it.” Deterrent = Discourage, Don’t attack. ❌ Why the Other Options Are Incorrect: A. Block access — Incorrect That’s a Preventive control (stops the incident physically or digitally). B. Detect attacks — Incorrect That’s a Detective control (logs, monitoring, IDS). D. Automatically restore service — Incorrect That’s a Corrective control (restores after an incident).
29
Which is an example of a deterrent control? A. Application splash screen B. Backup recovery C. Motion detectors D. Contacting authorities
Answer: A — Splash screens make attackers think twice. ✅ Explanation (Why the answer is A): An application splash screen that warns users about monitoring or legal restrictions discourages unauthorized access. Deterrent controls influence behavior rather than block, detect, or fix problems. Other examples: Signs (“No Trespassing”) Warning banners on login screens Visible cameras Deterrent = Psychological barrier. 🧠 Memory Trick: Think “Splash screen = Stop or think!” It warns and discourages before someone even tries. ❌ Why the Other Options Are Incorrect: B. Backup recovery — Incorrect That’s a Corrective control. It restores systems after an incident. C. Motion detectors — Incorrect That’s a Detective control. It identifies unauthorized presence. D. Contacting authorities — Incorrect That’s a Corrective control. It responds after an incident occurs.
30
Warning signs and posted messages are examples of: A. Compensating controls B. Deterrent controls C. Corrective controls D. Preventive controls
Answer: B — Deterrent controls. ✅ Explanation (Why the answer is B): Warning signs and posted messages are designed to discourage unauthorized or unsafe behavior. They don’t physically block access or fix problems; they influence behavior. Other examples: “Authorized Personnel Only” signs “Area under surveillance” notices Deterrent = Psychological barrier to reduce risky actions. 🧠 Memory Trick: Think: “Signs = Stop or Think.” If it warns you but doesn’t physically block you, it’s deterrent. ❌ Why the Other Options Are Incorrect: A. Compensating controls — Incorrect Used as a backup when the main control can’t be applied. C. Corrective controls — Incorrect Fix issues after an incident (e.g., fire extinguisher, backup restoration). D. Preventive controls — Incorrect Physically or technically block incidents from happening, not just warn about them.
31
Detective controls are used to: A. Prevent attacks B. Log and identify intrusion attempts C. Block unauthorized access D. Recover from incidents
Answer: B — Detective controls detect and log issues. ✅ Explanation (Why the answer is B): Detective controls are designed to identify and record security events after or during an occurrence. They do not prevent attacks, but they alert or document incidents so corrective or preventive measures can be taken. Examples: System logs Motion detectors Audit trails Intrusion detection systems (IDS) Detective = “Find it when it happens.” 🧠 Memory Trick: Think: “Detective = Detect it.” A detective finds and records the crime, doesn’t stop it. ❌ Why the Other Options Are Incorrect: A. Prevent attacks — Incorrect That’s a Preventive control. C. Block unauthorized access — Incorrect Preventive, not detective. D. Recover from incidents — Incorrect That’s a Corrective control.
32
Which is a detective control? A. System logs B. Demotion C. Separation of duties D. Power generator
Answer: A — System logs. ✅ Explanation (Why the answer is A): System logs record events and activities on a system. They help detect and track unauthorized access or other security incidents. This makes them a Detective control because their main purpose is monitoring and identification, not prevention or correction. Other examples: Reviewing login reports Audit trails Motion detectors Detective = “Detect and report, don’t block or fix.” 🧠 Memory Trick: Think: “Logs = Watchdog journal.” They keep track of what happens so you can spot problems later. ❌ Why the Other Options Are Incorrect: B. Demotion — Incorrect That’s a Deterrent or Corrective control, depending on context. C. Separation of duties — Incorrect That’s a Preventive or Compensating control; it reduces risk before it occurs. D. Power generator — Incorrect That’s a Corrective or Compensating control; it restores operations after a failure.
33
Regular patrol of property and reviewing login reports are examples of: A. Preventive controls B. Detective controls C. Directive controls D. Corrective controls
Answer: B — Detective controls. ✅ Explanation (Why the answer is B): Detective controls are designed to identify, record, and alert to security events that are happening or have already happened. Regular property patrols help spot unauthorized access or suspicious activity. Reviewing login reports identifies unusual or suspicious logins. Detective = “Find the problem while it happens or after it happens.” 🧠 Memory Trick: Think: “Detective = Investigate.” Just like a detective investigates a crime, these controls monitor and log activity. ❌ Why the Other Options Are Incorrect: A. Preventive controls — Incorrect Preventive controls stop incidents before they occur (e.g., locks, firewalls). C. Directive controls — Incorrect Directive controls tell people how to act (e.g., policies, signs). D. Corrective controls — Incorrect Corrective controls restore or fix systems after an incident (e.g., backup restoration, fire extinguishers).
34
Corrective controls are applied: A. Before an event B. After an event C. To discourage attacks D. To replace all other controls
Answer: B — Corrective = after an event. ✅ Explanation (Why the answer is B): Corrective controls are designed to restore systems or data to normal operation after a security incident. They do not prevent or detect incidents; they fix or mitigate the impact after something goes wrong. Examples: Restoring data from backups Applying patches after a breach Fire extinguishers Corrective = “Fix it after it breaks.” 🧠 Memory Trick: Think: “Corrective = Correct it after the problem occurs.” The keyword is “after.” ❌ Why the Other Options Are Incorrect: A. Before an event — Incorrect That’s Preventive control. C. To discourage attacks — Incorrect That’s Deterrent control. D. To replace all other controls — Incorrect Corrective controls don’t replace other controls; they complement them.
35
Restoring from backups to mitigate a ransomware attack is: A. Preventive B. Corrective C. Compensating D. Directive
Answer: B — Corrective. ✅ Explanation (Why the answer is B): Restoring from backups is done after a ransomware attack to bring systems and data back to normal. This is the essence of a Corrective control: it reacts to an incident to fix or restore. Other examples: Applying patches after an exploit Using a fire extinguisher after a fire starts Corrective = “Fix it after the problem occurs.” 🧠 Memory Trick: Think: “Corrective = Correct after crisis.” Backups are your safety net for post-incident recovery. ❌ Why the Other Options Are Incorrect: A. Preventive — Incorrect Preventive stops incidents before they happen (e.g., firewalls, locks). C. Compensating — Incorrect Compensating controls substitute when a primary control can’t be used. D. Directive — Incorrect Directive controls guide behavior (e.g., policies, signs).
36
Which is a corrective control listed in your notes? A. Contact law enforcement B. Fire extinguisher C. File storage policies D. Motion detectors
Answer: B — Fire extinguisher. Explanation: Corrective controls mitigate damage after an incident occurs. A fire extinguisher stops or reduces fire damage. Memory Trick: “Corrective = fix the problem now.”
37
Compensating controls are used when: A. Current controls are fully sufficient B. No technical controls exist C. Existing controls are insufficient D. Policies are missing
Answer: C — Compensating controls cover control gaps. Explanation: Compensating controls cover gaps when primary controls cannot be implemented. Memory Trick: “Compensating = filling in the gap.”
38
A firewall blocking a specific application while the app is awaiting a patch is an example of: A. Preventive control B. Compensating control C. Directive control D. Corrective control
Answer: B — Compensating. Explanation: This is a temporary alternative when the primary solution isn’t ready. Memory Trick: “Compensating = backup plan until fixed.”
39
Requiring simultaneous guard duties is an example of: A. Compensating control B. Preventive control C. Technical control D. Managerial control
Answer: A —Compensating. Explanation: Ensures coverage and mitigates risk when a single guard isn’t enough. Memory Trick: “Two guards = safety backup.”
40
Directive controls: A. Enforce compliance through policies B. Detect malicious activity C. Restore systems after failure D. Always prevent access
Answer: A — Enforce compliance through policies. Explanation: Directive controls tell people how to act via rules, procedures, or signs. Memory Trick: “Directive = directions for behavior.”
41
Which is a directive control? A. Compliance policies B. Backup recovery C. Demotion D. Property patrols
Answer: A — Compliance policies. Explanation: Policies direct employee behavior to follow security rules. Memory Trick: “Directive = policy guide.”
42
Posting a sign that says “Authorized Personnel Only” is what type of control? A. Compensating B. Directive C. Corrective D. Preventive
Answer: B — Directive control Explanation: Sign instructs people on allowed behavior, without physically blocking them. Memory Trick: “Directive = tells you what to do.”
43
A firewall is listed under which category and control type? A. Technical — Preventive B. Technical — Corrective C. Operational — Preventive D. Physical — Preventive
Answer: A — Technical/Preventive. Explanation: Firewall prevents unauthorized access using technology. Memory Trick: “Tech + Prevent = digital gatekeeper.”
44
A splash screen is listed as what type of control? A. Preventive B. Deterrent C. Directive D. Corrective
Answer: B — Deterrent. Explanation: Splash screens warn or discourage attackers but don’t block access. Memory Trick: “Splash = scare off intruders.”
44
System logs belong to: A. Managerial — Directive B. Technical — Detective C. Operational — Preventive D. Physical — Corrective
Answer: B — Technical/Detective. Explanation: System logs detect incidents and track events using technology. Memory Trick: “Logs = detective notes for IT.”
45
Backup recovery is classified as: A. Preventive B. Corrective C. Compensating D. Directive
Answer: B — Corrective. Explanation: Backup restores data after incidents. Memory Trick: “Corrective = bring things back online.”
46
Blocking an application instead of applying a patch is: A. Preventive B. Compensating C. Corrective D. Directive
Back: Answer: B — Compensating. Explanation: Temporary solution until the main control (patch) is implemented. Memory Trick: “Compensating = stopgap measure.”
47
File storage policies fall under: A. Technical — Preventive B. Technical — Directive C. Managerial — Preventive D. Operational — Directive
Answer: B — Technical/Directive. Explanation: Policies guide how files are handled via technical systems. Memory Trick: “Policy = tech rules.”
48
On-boarding policy is listed under: A. Managerial — Preventive B. Operational — Preventive C. Technical — Preventive D. Physical — Preventive
Answer: A — Managerial/Preventive. Explanation: Managerial prevents security mistakes by providing proper guidance to new employees. Memory Trick: “Managerial = manage risk early.”
49
Demotion is listed under which type? A. Preventive B. Corrective C. Deterrent D. Physical
Answer: C — Deterrent. Explanation: Demotion discourages policy violations through consequences. ✅ Explanation (Why the answer is C): A demotion is used to discourage inappropriate behavior or policy violations. It does not physically block access, detect issues, or restore systems—its purpose is psychological: to deter future violations. Deterrent = “Make people think twice before doing something wrong.” 🧠 Memory Trick: Think: “Demotion = Don’t repeat that action.” It’s a punishment or consequence to prevent repeat behavior. ❌ Why the Other Options Are Incorrect: A. Preventive — Incorrect Preventive stops incidents before they occur (e.g., locks, firewalls). B. Corrective — Incorrect Corrective fixes or restores after an incident. D. Physical — Incorrect Physical controls protect the environment (fences, locks, guard shacks), not behavior.
50
Reviewing login reports is a: A. Managerial — Detective control B. Operational — Detective control C. Technical — Directive control D. Physical — Preventive control
Answer: A — Managerial/Detective Explanation: ✅ (Why the answer is A): Reviewing login reports involves analyzing system logs to identify unusual or suspicious activity. It is detective because it identifies incidents that have occurred. It is managerial because management or oversight personnel typically perform the review as part of administrative duties. Detective = “Detect and monitor”, Managerial = “Oversight and policy enforcement.” 🧠 Memory Trick: Think: “Manager checks the logs to detect misbehavior.” Managerial = administrative, Detective = finds problems. ❌ Why the Other Options Are Incorrect: B. Operational — Detective control — Incorrect Operational detective controls are routine procedures executed by staff, like patrols, but login report review is usually administrative oversight. C. Technical — Directive control — Incorrect Technical controls enforce policy through systems, and directive controls tell users how to act. D. Physical — Preventive control — Incorrect Physical controls protect the environment (locks, fences) and prevent access, not detect or analyze incidents.
51
Policies for reporting issues are: A. Managerial — Corrective B. Technical — Directive C. Operational — Compensating D. Physical — Preventive
A — Managerial / Corrective ✅ Explanation (Why the answer is A): Policies for reporting issues are managerial because they are established by administration to guide organizational behavior. They are corrective because they define steps to respond to incidents or problems, ensuring proper resolution. Corrective = “Provides a structured way to fix problems after they occur.” Managerial = “Created and enforced by management.” 🧠 Memory Trick: Think: “Manager sets rules to correct mistakes.” Policies direct how to respond when issues happen. ❌ Why the Other Options Are Incorrect: B. Technical — Directive — Incorrect Technical directive controls enforce rules through technology, not via administrative policies. C. Operational — Compensating — Incorrect Operational compensating controls are alternative procedures when a primary control isn’t feasible. D. Physical — Preventive — Incorrect Physical preventive controls block access to resources (locks, fences), not administrative reporting.
51
Separation of duties is listed as a: A. Compensating control B. Preventive control C. Directive control D. Physical control
Answer: A Compensating Control. ✅ Explanation (Why the answer is A): Separation of duties is implemented when a primary control may not fully prevent risk. For example, splitting responsibilities between multiple people reduces fraud or error. It compensates for potential weaknesses in other controls, making it a Compensating control. Compensating = “Alternative protection when the main control isn’t enough.” 🧠 Memory Trick: Think: “Two heads are better than one — duties separated as backup protection.” If one person makes a mistake, the other mitigates the risk. ❌ Why the Other Options Are Incorrect: B. Preventive — Incorrect Preventive controls directly stop incidents (e.g., locks, firewalls), not substitute for other controls. C. Directive — Incorrect Directive controls tell people how to behave via policies or signs. D. Physical — Incorrect Physical controls protect the environment, not workflows or responsibility allocation.
51
Compliance policies are a: A. Managerial — Directive control B. Technical — Preventive control C. Physical — Preventive control D. Operational — Detective control
Answer: A — Managerial / Directive control ✅ Explanation (Why the answer is A): Compliance policies are: Managerial because they are created and enforced by management to ensure the organization follows rules and standards. Directive because they guide employee behavior and set expectations. Directive = “Tells people how to act.” Managerial = “Policy set by management.” 🧠 Memory Trick: Think: “Manager says: Follow the rules!” Policies direct action and are overseen by management. ❌ Why the Other Options Are Incorrect: B. Technical — Preventive — Incorrect Technical preventive controls stop incidents via systems, not policy enforcement. C. Physical — Preventive — Incorrect Physical controls protect the environment (locks, fences), not employee behavior. D. Operational — Detective — Incorrect Operational detective controls monitor actions, they don’t guide behavior.
51
A guard shack is an example of which control? A. Technical — Corrective B. Operational — Preventive C. Physical — Preventive D. Managerial — Compensating
C. Physical — Preventive ✅ A guard shack is a physical control because it involves a tangible barrier or structure used to secure a location. It is preventive because its presence deters or prevents unauthorized access before any incident occurs. Mnemonic to remember: “Physical barriers prevent problems.” Think: locks, fences, gates, and guard shacks = physical + preventive. Reason other answers are incorrect: A. Technical — Corrective ❌ Technical control involves software, hardware, or IT systems (e.g., firewalls, antivirus, intrusion detection). Corrective means it fixes or mitigates a problem after it happens (e.g., restoring data after a breach). A guard shack is neither technical nor corrective—it doesn’t fix anything after an incident; it prevents it. B. Operational — Preventive ❌ Operational controls are processes or procedures people follow (e.g., security training, background checks). Preventive fits because procedures aim to stop incidents before they happen. A guard shack is not a procedure—it’s a physical structure, so it’s not operational. C. Physical — Preventive ✅ This is correct, as explained: tangible security that prevents unauthorized access. Examples: guard shack, locked doors, fences, security cameras (physical aspect). D. Managerial — Compensating ❌ Managerial controls are high-level policies or directives (e.g., risk assessments, security policies). Compensating controls are backups or alternatives when a primary control isn’t feasible. A guard shack is not a policy or backup control; it’s a primary, physical preventive measure. Quick way to remember: Physical → tangible, real-world barrier Preventive → stops bad things before they happen Guard shack = physical + preventive ✅
51
Reception desk is what type of control? A. Operational — Deterrent B. Physical — Preventive C. Operational — Directive D. Managerial — Corrective
Answer: A — Operational/Deterrent. Explanation: A reception desk is operational because it’s part of a process handled by people—staff who monitor visitors and enforce access procedures. It is deterrent because its presence discourages unauthorized entry; people are less likely to try to bypass security when someone is watching. Why the other options are incorrect: B. Physical — Preventive ❌ Physical controls are tangible barriers (fences, locks, guard shacks). A reception desk is not a physical barrier—it’s staffed by people, so it’s operational. C. Operational — Directive ❌ Directive controls are policies or instructions telling people what to do. A reception desk is not a policy; it’s an active process carried out by personnel. D. Managerial — Corrective ❌ Managerial controls are high-level policies (e.g., risk assessments). Corrective controls fix or respond after an incident, which a reception desk does not do. Mnemonic: “Operations that watch = deterrent.” Think: People at desks observe and discourage bad behavior.
51
Property patrols fall under which control? A. Operational — Detective B. Managerial — Preventive C. Technical — Corrective D. Physical — Directive
Answer: A — Operational/Detective. A. Operational — Detective ✅ Explanation: Property patrols are carried out by people following a procedure, so they are operational controls. They are detective because their purpose is to identify security incidents or irregularities (e.g., trespassing, damage, theft) rather than prevent them. Why the other options are incorrect: B. Managerial — Preventive ❌ Managerial controls are high-level policies or directives. Patrols are actions, not policies. Preventive controls stop incidents before they happen; patrols mostly detect incidents that may already be occurring. C. Technical — Corrective ❌ Technical controls are IT/software-based (like firewalls). Patrols are human activities. Corrective controls fix problems after they occur, which patrols do not directly do. D. Physical — Directive ❌ Physical controls are tangible barriers (fences, locks, guard shacks). Directive controls are policies or rules telling people what to do. Patrols are active monitoring, not a policy or a physical barrier. Mnemonic: “Operational detectives watch for trouble.” Think: Patrolling = looking and reporting, not stopping or fixing.
52
Which of the following BEST describes non-repudiation? A. Ensures only authorized users can access data B. Ensures data cannot be altered C. Provides proof that a message or action came from a specific user D. Ensures systems remain online during failures
The correct answer is: C. Provides proof that a message or action came from a specific user ✅ Explanation: Non-repudiation ensures that someone cannot deny having performed a specific action or sent a message. This is usually achieved with digital signatures, certificates, or audit logs, which provide verifiable proof of origin. Why the other options are incorrect: A. Ensures only authorized users can access data ❌ This describes confidentiality, not non-repudiation. B. Ensures data cannot be altered ❌ This describes integrity, not non-repudiation. D. Ensures systems remain online during failures ❌ This describes availability, not non-repudiation. Mnemonic: “Non-repudiation = No denials allowed.” Think: Digital signatures prove exactly who did what and when.
53
What is the first step in creating a digital signature? (Refer to the model page 3 of your Professor Messor Course Notes for questions 59-.63. A. Encrypt the plaintext with a public key B. Hash the plaintext using a hashing algorithm C. Decrypt the digital signature D. Compare the hashes
Answer: B ✅ Explanation: The first step in creating a digital signature is to generate a hash of the plaintext. This hash represents a unique fingerprint of the data before it is encrypted with the sender’s private key.
54
Why does Alice encrypt the hash with her private key? A. To ensure confidentiality of the message B. To generate a digital signature that provides non-repudiation C. To prevent the plaintext from being altered D. To allow the message to remain anonymous
Answer: B ✅ Explanation: Encrypting the hash with Alice’s private key creates a digital signature. This allows anyone with Alice’s public key to verify the signature and ensures non-repudiation, proving Alice sent it.
55
Which key does Bob use to decrypt the digital signature? A. His private key B. Alice’s private key C. Bob’s public key D. Alice’s public key
Answer: D ✅ Explanation: Bob uses Alice’s public key to decrypt the digital signature. This allows him to obtain the hash Alice created and verify the message’s authenticity.
56
How does Bob verify that the message has not been altered during transit? A. By comparing the plaintext to the digital signature directly B. By hashing the plaintext he received and comparing it to the decrypted hash from the digital signature C. By encrypting the message with his private key D. By checking Alice’s public key
Answer: B - By hashing the plaintext he received and comparing it to the decrypted hash from the digital signature ✅ Explanation: Bob hashes the received plaintext and compares it to the hash obtained from the decrypted digital signature. If the hashes match, the message is authentic and unaltered.
57
What security principle does a digital signature primarily support? A. Availability B. Integrity and Non-repudiation C. Confidentiality D. Redundancy
Answer: B ✅ Explanation: Digital signatures ensure integrity (message hasn’t been altered) and non-repudiation (sender cannot deny sending the message).
58
Which statement BEST describes a security gap analysis? A. Identifying the cheapest security controls B. Comparing current security posture to a desired future state C. Documenting only regulatory requirements D. Testing incident response only
Correct Answer: B. Comparing current security posture to a desired future state Explanation (concise) A security gap analysis identifies the difference between where your security is now and where it needs to be based on standards, policies, or desired maturity. It highlights weaknesses, missing controls, and areas to improve. • A is wrong — not about cost. • C is too narrow — gap analysis includes more than regulations. • D is wrong — incident response testing is just one component. Mnemonic “NOW vs. NEXT” • NOW = current security state • NEXT = desired future state Gap analysis = finding the space in between. Or: “MAP the GAP” • Measure current • Aim for desired • Pinpoint the gaps
59
In a gap analysis, ISO/IEC 27001 is used as what? A. Current baseline B. End goal/target framework C. Vendor-specific policy D. Internal-only standard
Correct: B Correct Answer: B. End goal/target framework Explanation (concise) In a gap analysis, organizations often use ISO/IEC 27001 as the target or desired security standard. They compare their current security posture to the requirements of ISO 27001 to see what’s missing. • A is wrong — the baseline is the organization’s current posture, not ISO. • C is wrong — ISO isn’t vendor-specific. • D is wrong — ISO is an international standard, not internal. Mnemonic “ISO = I Should Obtain” → It’s the goal you want to reach.
60
A new security manager joins a mid-size company and discovers that no written security policies, procedures, or standards exist. The company has firewalls and endpoint protection, but nothing formal defines required controls, responsibilities, or minimum security expectations. The manager must perform a gap analysis and needs to determine what baseline security framework to compare the environment against. Question What baseline should be used? A. Survey employee opinions B. Use NIST SP 800-171 baseline C. Skip baseline D. Review firewall rules ⸻ Correct Answer: B. Use NIST SP 800-171 baseline Explanation (concise) When no internal documentation exists, you must rely on an industry-recognized security framework as the baseline. NIST SP 800-171 provides a standardized set of security controls, especially useful for organizations that lack documented policies. • A is wrong — employee opinions are not a security standard. • C is wrong — you must use some baseline for a gap analysis. • D is wrong — reviewing firewall rules is not a baseline. ⸻ Mnemonic “No docs? Use NIST.” If the organization has no written policies, default to a recognized external framework.
Correct Answer: B. Use NIST SP 800-171 baseline Explanation (concise) When no internal documentation exists, you must rely on an industry-recognized security framework as the baseline. NIST SP 800-171 provides a standardized set of security controls, especially useful for organizations that lack documented policies. • A is wrong — employee opinions are not a security standard. • C is wrong — you must use some baseline for a gap analysis. • D is wrong — reviewing firewall rules is not a baseline. ⸻ Mnemonic “No docs? Use NIST.” If the organization has no written policies, default to a recognized external framework.
61
Evaluating people and processes includes: A. Reviewing heatmaps B. Assessing training and experience C. Installing firewalls D. Packet captures
Correct Answer: B. Assessing training and experience Explanation (concise) Evaluating people and processes focuses on human factors and operational workflows, such as: • Staff training levels • Staff experience • How processes are performed • Whether procedures are followed correctly The other options relate to technical controls, not people or processes. • A Heatmaps → risk visualization • C Installing firewalls → technical control • D Packet captures → network analysis Mnemonic “People = Prep & Practice” → Training (prep) + Experience (practice).
62
Researching existing systems and evaluating policies occurs in which gap-analysis step? A. Determine end goal B. Examine current processes C. Create final report D. Choose framework
Correct: B Explanation: Before comparing, you must understand current processes. Correct answer: B. Examine current processes Explanation (concise): Researching existing systems and evaluating policies is all about understanding what you currently have in place. That falls under the step where you assess the present state before identifying gaps—this is examining current processes. You can’t compare to the desired end state until you know where you are now. Mnemonic: “Now Before Next” → Now = B = B. Examine Baseline (current processes) before moving to the next steps.
63
Compare-and-contrast in gap analysis includes: A. Buying tools B. Evaluating existing systems + identifying weaknesses C. Checking privacy law compliance only D. Creating IR teams
Correct answer: B. Evaluating existing systems + identifying weaknesses Explanation (concise): The compare-and-contrast stage of a gap analysis is where you look at what currently exists, compare it to the desired standard, and identify weaknesses or gaps. That is exactly what option B describes. Mnemonic: “C&C = Check & Critique” → In the Compare & Contrast step, you Check what you have and Critique what’s missing.
64
A security analyst is performing a gap analysis on the organization’s incident response plan. During the review, the analyst breaks each major category—such as detection, containment, communication, and recovery—into many smaller, more specific subcategories. This lets the analyst pinpoint exactly where procedures are unclear, missing, or outdated. The goal is to understand the plan at a granular level so gaps can be accurately identified and corrected. Breaking categories into small segments is done to: A. Assign blame B. Increase document length C. Get detailed analysis D. Count controls
Correct Answer: C. Get detailed analysis Explanation (concise): Breaking categories into smaller pieces allows you to analyze each part thoroughly so gaps, weaknesses, and inconsistencies become clear. It improves accuracy—not length, blame, or control-counting. Mnemonic: “Break small to see all.” Breaking things down = seeing everything clearly → detailed analysis.
65
Analysis & report phase includes: A. Selecting the framework B. Formal description of current state + recommendations C. User training D. Updating firewall rules
Correct answer: B. Formal description of current state + recommendations Explanation (concise): The analysis & report phase of a gap analysis documents the current state, identifies gaps, and provides recommendations to close those gaps. It does not involve selecting frameworks, training users, or updating technical controls. Mnemonic: “A&R = Analyze & Recommend.” This phase analyzes what exists and recommends what to fix.
66
Management asks how to reach future goals. Which deliverable answers this? A. Topology diagram B. Path from current security to goal C. Updated AUP D. Help desk queue
Correct: B Explanation: Gap analysis must include a roadmap. The only deliverable that shows the current state → future state plan is the path/roadmap. This is basically a gap analysis and action plan. Mnemonic: Path = Plan Ahead To Horizon. Mnemonic: “B = Bridge.” You need a bridge from where you are to where you want to go.
67
Which phrase defines Zero Trust? A. Trust but verify B. Once inside, always trusted C. Never trust, always verify D. Perimeter=protection
Answer: C. Never trust, always verify Explanation: Zero Trust means every request is treated as untrusted, even if it comes from inside the network. Verification happens every time. Mnemonic: “Zero Trust = Zero automatic trust.”
68
Traditional networks are weak without ZT because: A. Outside always encrypted B. Inside is open with few controls C. VLANs are impossible D. Routers can’t filter
Answer: B. Inside is open with few controls Explanation: Traditional networks rely on a strong perimeter. Once you’re inside, there’s too much implicit trust, minimal segmentation, and weaker internal controls — which is exactly what Zero Trust fixes. Mnemonic: “B = Bubble.” Traditional networks are a bubble: hard outside, soft inside.
69
Zero Trust is: A. Firewall config B. Holistic approach covering devices, processes, people C. VPN method D. Password schedule
Answer: B. Holistic approach covering devices, processes, people Explanation: Zero Trust isn’t a single tool. It’s a full security strategy that applies verification and least privilege across users, devices, apps, data, and workflows. Mnemonic: “Zero Trust = Big picture.” So the answer is B.
70
Planes of operation apply to: A. Physical devices only B. Physical, virtual, cloud components C. Routing protocols only D. Only security systems
Answer: B. Physical, virtual, cloud components Explanation: Planes of operation (data plane, control plane, management plane) apply across all types of infrastructure — physical hardware, virtual systems, and cloud environments. Mnemonic: “Planes fly everywhere.”
71
Which plane handles forwarding, trunking, NAT? A. Control plane B. Data plane C. Policy plane D. Identity plane
Answer: B. Data plane Explanation: The data plane is responsible for actual traffic movement → forwarding, switching, trunking, NAT, encapsulation, etc. Mnemonic: “Data = Do.” The data plane does the work of moving packets.
72
Control plane handles: A. Forwarding packets B. Defining policies + routing tables C. Frame processing D. NAT translations
Answer: B. Defining policies + routing tables Explanation: The control plane makes the decisions—it builds routing tables, applies policies, manages protocols (OSPF, BGP), and tells the data plane how to forward. Mnemonic: “Control = Commands.” The control plane commands the data plane.
73
A company implements a new access control system that checks a user’s identity, device health status, geolocation, and recent behavior patterns before allowing access to internal apps. The system adjusts the level of trust based on these changing attributes in real time. Which technology is the company using? A. Security zones B. Adaptive identity C. Data masking D. Tokenization
Correct Answer: B. Adaptive identity Explanation: Adaptive identity adjusts access based on multiple attributes (user, device, location, behavior) and changes trust dynamically. It’s part of modern Zero Trust identity systems. • Security zones = network segmentation • Data masking = hiding sensitive fields • Tokenization = replacing data with tokens ⸻ Mnemonic: “Adaptive = Adjusts.” Adaptive identity adjusts access as conditions change → B.
74
Which component generates access tokens and instructs PEP? A. PDP B. Policy Engine C. Policy Administrator D. Data Plane
Answer: C. Policy Administrator Explanation: The Policy Administrator (PA) is the component that: • Generates access tokens • Sends instructions to the PEP on what to allow or deny • Acts as the bridge between the decision (PDP) and the enforcement (PEP) PDP = decides PA = delivers PEP = enforces Mnemonic: “Administrator = Action.” The PA takes action by sending tokens + commands to the PEP.
75
Policy Engine does what? A. Makes authentication stronger B. Evaluates access decisions using policies C. Logs sessions D. Routes data
Answer: B. Evaluates access decisions using policies Explanation: The Policy Engine (PE) is the decision-maker in a Zero Trust or access control system. It: • Uses defined policies to decide whether access should be allowed or denied • Works with the Policy Administrator to enforce decisions via the PEP • A = strengthens auth, but not the main role • C = logging is separate • D = routing is data plane Mnemonic: “Engine = Evaluate.” The Policy Engine evaluates access requests → B.
76
PEP (Policy Enforcement Point) is: A. Logging system B. Gatekeeper that allows/monitors/terminates C. Token generator D. VPN-only component
Answer: B. Gatekeeper that allows/monitors/terminates Explanation: The Policy Enforcement Point (PEP) is the enforcement component in an access control system. It: • Allows or denies access based on the Policy Engine’s decisions • Monitors sessions • Terminates connections if policy conditions are violated • A = logging is separate • C = token generation is done by Policy Administrator • D = not limited to VPNs Mnemonic: “PEP = Protector.” PEP protects access points by enforcing policy → B.
77
A company has a network segmented into untrusted and trusted zones. A user from the untrusted zone tries to access resources in the trusted zone. The security system automatically blocks the request unless there is a specific rule permitting it. Which principle is being applied? A. Allow automatically B. Deny unless explicitly allowed C. Auto encrypt D. Bypass inspection
Correct Answer: B. Deny unless explicitly allowed Explanation: This is the default-deny principle, a core part of Zero Trust and secure network segmentation: • Traffic from an untrusted zone is denied by default • Access is only granted if a specific policy or rule explicitly allows it • Helps enforce least privilege and reduces risk of compromise • A = unsafe, opposite of Zero Trust • C = encryption is separate from access control • D = bypassing inspection defeats security ⸻ Mnemonic: “Zero Trust = Zero free passes.” Nothing from untrusted → trusted is allowed unless explicitly permitted → B.
78
Security zones help determine: A. Hashing B. Traffic origin/destination context C. Firewall vendor D. Cable type
Answer: B. Traffic origin/destination context Explanation: Security zones segment a network into logical areas (trusted, untrusted, DMZ, etc.) to help control and inspect traffic. They provide context about where traffic is coming from and where it’s going, which guides policy decisions. • A = hashing is unrelated • C = firewall vendor is irrelevant • D = cable type doesn’t define zones Mnemonic: “Zones = Where traffic goes.” Security zones tell you the origin and destination context → B.
79
What channels people and blocks vehicles? A. Fencing B. Barricades/Bollards C. Guards D. Lighting
Answer: B. Barricades/Bollards Explanation: Barricades and bollards are physical security controls that: • Channel pedestrian traffic safely • Block or slow vehicles from entering restricted areas • A = fencing is a general boundary, not traffic-specific • C = guards monitor but don’t physically channel traffic • D = lighting deters, but doesn’t physically block Mnemonic: “B = Barrier for both.” Barricades/Bollards block vehicles and guide people →
80
Access control vestibules (mantraps) work by: A. Unlocking all doors B. Allowing both open C. One must close before other opens D. Egress only
Answer: C. One must close before other opens Explanation: An access control vestibule (mantrap) is a small room with two interlocking doors. Its security principle: • Only one door can open at a time • Ensures identity verification before entering a secure area • Prevents tailgating and unauthorized access • A/B = defeats security • D = mantraps control ingress and egress, not just exit Mnemonic: “Mantrap = One at a time.” Only one door opens at a time
81
A company’s secure data center has experienced incidents where unauthorized individuals follow employees closely to enter restricted areas without using their own credentials. Management wants a control that physically prevents tailgating while verifying identity. Which control is most effective? A. Swing door B. Mantrap C. Fence D. Motion light
Correct Answer: B. Mantrap Explanation: A mantrap is a dual-door access control vestibule: • Only one door can open at a time • Ensures the person is authenticated before entering the secure area • Physically prevents tailgating • A = swing doors do not prevent tailgating • C = fence defines perimeter but doesn’t control individual entry • D = motion light deters but doesn’t physically block access ⸻ Mnemonic: “Mantrap = No sneaky entry.” Mantraps trap one person at a time, preventing tailgating →
82
Opaque fencing characteristic: A. See through B. Cannot see through (privacy) C. Decorative only D. Electrified
Answer: B. Cannot see through (privacy) Explanation: Opaque fencing is designed to block visibility for security and privacy purposes: • Prevents outsiders from seeing inside a secure area • Often used around sensitive facilities • A = see-through fencing is transparent • C = decorative doesn’t define opacity • D = electrified is about deterrence, not visibility Mnemonic: “Opaque = Out of sight.” You cannot see through
83
CCTV provides: A. Unbypassable control B. Automatic arrests C. Recording & guard replacement/supplement D. Eliminates lighting
Answer: C. Recording & guard replacement/supplement Explanation: CCTV (Closed-Circuit Television) is primarily used to: • Record activity for review or evidence • Supplement security personnel by monitoring areas remotely • Does not automatically enforce or arrest • A = CCTV can be bypassed • B = arrests require human action • D = CCTV doesn’t replace lighting Mnemonic: “CCTV = Capture & Track.” It records events and supports guards
84
Feature for restricted-zone alerts: A. IR detection B. Object detection w/ motion recognition C. Ultrasonic sensing D. Microwave sensing
Answer: B. Object detection w/ motion recognition Explanation: For restricted-zone alerts, the system needs to detect movement or intrusion in a defined area. • Object detection with motion recognition can identify unauthorized entry and trigger alarms in real time. • A = IR detection senses heat but may give false positives • C = Ultrasonic sensing is for proximity, not large zones • D = Microwave sensing detects movement but is less precise than motion recognition for restricted zones Mnemonic: “Motion = Must alert.” Use motion recognition to catch intrusions
85
A corporate campus hires security guards to patrol the premises. Their responsibilities include monitoring entrances, verifying employee IDs, responding to incidents, and providing a visible deterrent. Which role best describes these security guards? A. Detective only B. Physical protection + ID validation C. Replace badges D. Require weapons
B. Physical protection + ID validation Explanation: Security guards provide: • Physical protection of assets and people • ID validation to control access • Can respond to incidents and deter unauthorized activity • A = detectives investigate, not general access control • C = replacing badges is administrative • D = weapons are optional, not defining ⸻ Mnemonic: “Guards = Gatekeepers.” They protect and check IDs
86
Access badge includes: A. MAC/IP B. Picture, name, details; electronically logged C. SSN D. Fingerprint only
Answer: B. Picture, name, details; electronically logged Explanation: An access badge typically contains: • Photo for visual ID • Name and role • Electronic credentials that are logged when used for access control • A = MAC/IP are network identifiers, not on badges • C = SSN is sensitive, not standard on badges • D = Fingerprint may be used for biometrics, but badges are more than that Mnemonic: “Badge = ID + Log.” Badge shows who you are and records your entry
87
Why is lighting important? A. Helps attackers B. Attackers avoid light; cameras see better C. Replaces CCTV D. Cosmetic
Answer: B. Attackers avoid light; cameras see better Explanation: Proper security lighting: • Deters attackers by exposing them • Improves visibility for CCTV and guards • Enhances overall situational awareness • A = wrong, light deters, not helps • C = lighting does not replace CCTV • D = cosmetic is secondary Mnemonic: “Light = Lurk-proof.” Bright areas make it harder for attackers to hide
88
A facility wants a motion sensor that can detect intruders based on body heat, regardless of whether the area is brightly lit or dark. Which sensor type should they use? A. Pressure B. Infrared C. Ultrasonic D. Microwave
B. Infrared Explanation: Infrared (IR) sensors detect heat signatures from people or objects. • Works in light or darkness • Often used in motion detection and restricted area alerts • A = pressure requires physical contact • C = ultrasonic detects movement via sound waves • D = microwave detects motion via radio waves, not heat ⸻ Mnemonic: “IR = Invisible heat.” Detects body heat in dark or light → B.
89
Sensor detecting force change? A. IR B. Pressure C. Microwave D. Ultrasonic
Answer: B. Pressure Explanation: Pressure sensors detect changes in force or weight applied to a surface. • Often used in floormats or entryways to detect someone stepping on them • Trigger alarms when force is applied • A = IR detects heat • C = Microwave detects motion via radio waves • D = Ultrasonic detects motion via sound waves Mnemonic: “Pressure = Pushed.” Detects force applied
90
Sensor detecting wide-area movement with RF waves? A. Microwave B. Ultrasonic C. Pressure D. IR
Answer: A. Microwave Explanation: Microwave sensors use radio frequency (RF) waves to detect movement over a wide area. • They can penetrate light walls or obstacles • Often used for perimeter or large-area intrusion detection • B = Ultrasonic uses sound waves, not RF • C = Pressure detects force • D = IR detects heat Mnemonic: “Microwave = Motion waves.” RF waves detect movement in wide areas
91
Sensor sending ultrasonic pulses + reflections? A. Ultrasonic B. Microwave C. IR D. Vibration
Answer: A. Ultrasonic Explanation: Ultrasonic sensors: • Send high-frequency sound pulses • Detect movement by measuring reflections/echoes from objects • Used for motion detection and proximity sensing • B = Microwave uses RF waves • C = IR detects heat • D = Vibration detects physical shaking Mnemonic: “Ultrasonic = Echo check.” Sends sound pulses and listens for echoes
92
Honeypot is: A. Patching system B. Fake vulnerable system to attract attackers C. Logging platform D. VPN endpoint
Answer: B. Fake vulnerable system to attract attackers Explanation: A honeypot is a decoy system designed to: • Appear vulnerable to attackers • Attract and monitor attacks without risking real assets • Help security teams analyze tactics and gather intelligence • A = patching secures systems • C = logging platform records events but isn’t a decoy • D = VPN endpoint allows remote access Mnemonic: “Honeypot = Hacker bait.” It lures attackers →
93
Honeypots today are: A. Closed source B. Open-source, many options C. Vendor-only D. Air-gapped
Correct: B Explanation: Many free honeypots exist. Mnemonic: Honey = Hundreds of options.
94
A security team wants to deploy a honeypot to study attacker behavior without risking production systems. They want a solution that is flexible, customizable, and widely supported by the security community. Which statement best describes honeypots today? A. Closed source B. Open-source, many options C. Vendor-only D. Air-gapped
B. Open-source, many options Explanation: Modern honeypots: • Are open-source, with many tools and frameworks available (e.g., Cowrie, Honeyd) • Allow customization and community contributions • Can be deployed in virtual environments for research without affecting production • A = many are open-source, not strictly closed • C = not limited to vendors • D = air-gapped is optional, not defining ⸻ Mnemonic: “Honeypot = Hacker playground.” Open-source honeypots give lots of options
95
Major honeypot risk: A. No logs B. Can be used by attackers to pivot if not isolated C. Can't capture tools D. Requires physical access
Answer: B. Can be used by attackers to pivot if not isolated Explanation: The major risk of honeypots is that if they are not properly isolated, attackers who compromise them could: • Move laterally into real systems • Use the honeypot as a launch point for attacks • A = honeypots always log activity by design • C = they are specifically meant to capture attacker tools and behavior • D = physical access is not typically required Mnemonic: “Honeypot = Hidden trap.” If not isolated, it can backfire on your network →
96
A company places a file named “passwords.txt” on a server that contains fake credentials. If an attacker tries to access this file, the system generates an alert for the security team. What is the purpose of this honeyfile? A. Provide real credentials B. Lure attackers + trigger alert C. Reduce storage D. Encrypt backups
Correct Answer: B. Lure attackers + trigger alert Explanation: A honeyfile is a decoy file designed to: • Appear valuable to attackers • Trigger alerts when accessed • Help security teams detect intrusion attempts • A = honeyfiles contain fake data, not real creds • C = storage is irrelevant • D = encryption is unrelated ⸻ Mnemonic: “Honeyfile = Hacker bait file.” It lures attackers and signals intrusion
97
A company embeds fake API credentials (honeytokens) in its code repository. If these credentials are used, the security team receives an alert. What is the primary purpose of this honeytoken? A. Developer access B. Tracking malicious actors + data misuse C. MFA improvement D. Log compression
Correct Answer: B. Tracking malicious actors + data misuse Explanation: Honeytokens are decoy data elements designed to: • Appear valuable (like fake API keys, credentials, or documents) • Detect unauthorized access or misuse • Help identify attackers or insider threats • A = they are not for legitimate developer use • C = unrelated to multi-factor authentication • D = unrelated to logs ⸻ Mnemonic: “Honeytoken = Honey trap for data.” It triggers alerts when misused → B.
98
A company creates a fake email account and monitors it online. If anyone attempts to access or interact with the account, the security team is notified. What type of security control is this? A. Honeynet B. Honeytoken C. Honeyfile D. Real email
⸻ Correct Answer: B. Honeytoken Explanation: A honeytoken is any decoy data or resource that: • Appears legitimate or valuable • Triggers an alert when accessed • Can include files, credentials, or accounts (like a fake email) • A = honeynet = entire network of decoys • C = honeyfile = decoy file on a system • D = real email = legitimate account ⸻ Mnemonic: “Honeytoken = Bait that alerts.” Fake email triggers alerts → B.
99
AAA — Identification means: A. Proving identity B. Stating who you claim to be (username) C. Tracking actions D. Assigning roles
Answer: B. Stating who you claim to be (username) Explanation: In AAA (Authentication, Authorization, Accounting): • Identification = claiming an identity (e.g., entering a username) • Authentication = proving that claim (password, biometrics) • Authorization = determining what actions are allowed • Accounting = tracking activities • A = proving identity = Authentication • C = tracking actions = Accounting • D = assigning roles = Authorization Mnemonic: “I = Introduce yourself.” Identification = state who you are
100
Authentication means: A. Tracking usage B. Proving identity (passwords/MFA) C. Assigning access D. Logging off
Answer: B. Proving identity (passwords/MFA) Explanation: In AAA (Authentication, Authorization, Accounting): • Authentication = verifying that the claimed identity is genuine using credentials like: • Passwords • MFA (multi-factor authentication) • Biometrics • A = tracking usage = Accounting • C = assigning access = Authorization • D = logging off = not AAA-related
101
Authorization means: A. Who you are B. How you prove it C. What you can do D. What you logged
Answer: C. What you can do Explanation: In AAA (Authentication, Authorization, Accounting): • Authorization = determining permissions and access rights after identity is authenticated • Controls what resources or actions a user is allowed to perform • A = who you are = Identification • B = how you prove it = Authentication • D = what you logged = Accounting Mnemonic: “Authorization = Access allowed.” It defines what you’re allowed to do
102
Accounting tracks: A. Location only B. Login time, data used, logout time C. Password history D. Firewall throughput
Correct answer: B. Login time, data used, logout time Explanation (concise): In AAA (Authentication, Authorization, Accounting), Accounting tracks user activity: when they logged in, what resources they accessed, how much data they used, and when they logged out. Mnemonic: “Accounting = Activity.” If it tracks user activity, it’s Accounting.
103
The IT security team has configured the corporate VPN so that only laptops with a company-issued digital certificate can connect. When an employee tries to use a personal device or one without the proper certificate, the VPN denies access. This ensures that only authorized devices with verified credentials can access the network remotely. Question: Only cert-installed laptops are allowed on the VPN. This is: A. Password rotation B. Certificate authentication C. Tokenization D. SSO
Correct Answer: B. Certificate authentication Explanation: Using digital certificates to verify a device or user is certificate-based authentication, which ensures that only trusted devices can access resources. It is not password rotation, tokenization, or single sign-on. Mnemonic: “Cert = Certain device access.” Certificate authentication = guarantees access only to approved devices.
104
Authorization model advantage: A. Increases complexity B. Direct user-resource mapping C. Reduces complexity + supports many users/resources D. Removes need for auth
Correct answer: C. Reduces complexity + supports many users/resources Explanation (concise): A well-designed authorization model (like RBAC—Role-Based Access Control) simplifies management by grouping users and resources, reducing administrative overhead while supporting a large number of users and resources efficiently. It does not remove authentication or make things more complex. Mnemonic: “Auth model = Simplify + Scale.” Authorization models reduce complexity and scale easily.
105
No authorization model issues: A. Easy to understand B. Scales well C. Does NOT scale, hard to justify rights D. Eliminates AAA
Correct answer: C. Does NOT scale, hard to justify rights Explanation (concise): Without an authorization model, access is assigned individually, making it difficult to manage as the number of users and resources grows. This leads to inefficiency and challenges in justifying or auditing permissions. Mnemonic: “No model = No scale.” Without a model, access management becomes unscalable and confusing.
106
Technical change management focuses on: A. Why change occurs B. How to make technical changes C. Financing D. Awareness training
Correct answer: B. How to make technical changes Explanation (concise): Technical change management deals with the processes, procedures, and controls for implementing technical changes safely and efficiently—like system upgrades, patches, or configuration changes. It’s not about why changes occur, financing, or general awareness training. Mnemonic: “Tech Change = How to Change.” Focus is on the how of implementing technical modifications.
107
Allow list means: A. Everything allowed except blocked B. Nothing runs unless approved C. Only AV runs D. Only Microsoft runs
Correct answer: B. Nothing runs unless approved Explanation (concise): An allow list (or whitelist) is a security approach where only pre-approved applications, IPs, or users are permitted; everything else is blocked by default. This is the opposite of a block list, which allows everything except what’s explicitly blocked. Mnemonic: “Allow list = Only Allowed.” If it’s not on the list, it cannot run.
108
What is a digital certificate? A. Password vault B. Public key bound to identity C. Symmetric key D. TLS config file
Correct answer: B. Public key bound to identity Explanation (concise): A digital certificate is a cryptographic credential that links a public key to a specific identity (person, device, or organization). It’s used to verify authenticity, encrypt communications, and support secure authentication. Mnemonic: “Cert = Confirms Identity.” The certificate proves the public key belongs to the stated owner.
109
Why is a digital signature used on a certificate? A. Encrypt contents B. Provide anonymity C. Add trust via CA D. Key stretching
Correct answer: C. Add trust via CA Explanation (concise): A digital signature on a certificate is applied by a Certificate Authority (CA) to verify that the certificate is legitimate and has not been tampered with. This adds trust, allowing others to rely on the certificate’s authenticity. It is not primarily for encryption, anonymity, or key stretching. Mnemonic: “Signed by CA = Trusted Authority.” The signature proves the certificate can be trusted.
110
PKI adds trust primarily through what? A. DNSSEC B. Certificate Authorities C. NAT D. DHCP
Correct answer: B. Certificate Authorities Explanation (concise): Public Key Infrastructure (PKI) establishes trust by having Certificate Authorities (CAs) issue and digitally sign certificates. These certificates confirm that a public key truly belongs to the stated entity, enabling secure communications. Mnemonic: “PKI Trust = CA Verified.” CAs are the backbone of PKI trust.
111
Where is certificate creation commonly built-in? A. Routers B. Browsers C. OS services D. Switches
Correct answer: C. OS services Explanation (concise): Certificate creation and management is commonly built into operating system services, such as Windows Certificate Services or Linux OpenSSL tools. These handle generating keys, signing requests, and managing certificates. It’s not typically a function of browsers, routers, or switches. Mnemonic: “OS = Owns Certificates.” Operating systems provide the built-in tools for certificate management.
112
What is X.509? A. Hashing algorithm B. VPN protocol C. Certificate format D. Key stretching
Correct answer: C. Certificate format Explanation (concise): X.509 is the standard format for digital certificates. It defines the structure for public key certificates, including fields like the subject, issuer, public key, validity period, and signature. It is not a hashing algorithm, VPN protocol, or key stretching method. Mnemonic: “X.509 = eXact Certificate Format.” It specifies how certificates are structured and interpreted.
113
Which is NOT in an X.509 certificate? A. Serial number B. Signature algorithm C. Holder name D. Password
Correct answer: D. Password Explanation (concise): An X.509 certificate includes fields like serial number, signature algorithm, holder/subject name, issuer, and public key, but it does not contain passwords. Passwords are never stored in certificates. Mnemonic: “Certs hold keys, not secrets.” Certificates store public keys and identity info, not passwords.
114
What describes the root of trust? A. Cloud SLA B. Foundational trust anchor C. Password database D. VPN endpoint
Correct answer: B. Foundational trust anchor Explanation (concise): The root of trust is the foundational trust anchor in a security system—usually a root certificate or hardware component—that other trust relationships rely on. It serves as the ultimate source of trust for verifying identities or keys. Mnemonic: “Root = Reliable Anchor.” All trust in the system stems from this anchor.
115
How do systems trust the unknown? A. Allow anonymous B. Trusted party approval C. Use logs D. Disable encryption
Correct answer: B. Trusted party approval Explanation (concise): Systems establish trust with unknown entities through a trusted third party, like a Certificate Authority (CA), which verifies identities and vouches for them. This ensures that unknown parties can be trusted without direct prior knowledge. Mnemonic: “Trust the Trusted.” Unknown = verified by a trusted party before access is allowed.
116
Which serves as hardware root of trust? A. DHCP B. HSM/Secure Enclave C. DNS D. Proxy
Correct answer: B. HSM/Secure Enclave Explanation (concise): A Hardware Security Module (HSM) or Secure Enclave acts as a hardware root of trust, securely storing cryptographic keys and performing sensitive operations. It provides a trusted foundation for cryptographic operations, unlike DHCP, DNS, or proxies. Mnemonic: “Hardware = Hands-on Trust.” Physical hardware securely anchors cryptographic trust.
117
Why do browsers trust website certs automatically? A. Browser generates key B. Browser has root CA store C. DNS verifies D. Routers sign cert
Correct answer: B. Browser has root CA store Explanation (concise): Browsers automatically trust website certificates because they include a built-in store of trusted root Certificate Authorities (CAs). If a website’s certificate is signed by a CA in this store, the browser trusts it. DNS, routers, or key generation do not provide this trust. Mnemonic: “Browser CAs = Instant Trust.” Root CA store = reason certificates are automatically trusted.
118
CA responsibility when issuing web cert? A. Generate private key B. Validate identity/domain C. Configure HTTPS D. Manage DNS
Correct answer: B. Validate identity/domain Explanation (concise): When a Certificate Authority (CA) issues a web certificate, its main responsibility is to verify the identity of the requester or the ownership of the domain. The CA does not generate private keys for the user, configure HTTPS, or manage DNS. Mnemonic: “CA = Confirm Authenticity.” CAs ensure the entity requesting the certificate is legitimate.
119
CSR process next step? A. Send private key B. CA validates and signs C. Store CSR D. Publish CSR
Correct answer: B. CA validates and signs Explanation (concise): After generating a Certificate Signing Request (CSR), the next step is to send it to a Certificate Authority (CA). The CA validates the identity/domain and then signs the certificate, creating a trusted certificate for use. The private key is never sent. Mnemonic: “CSR → CA Signs.” CSR goes to the CA, which validates and issues the certificate.
120
Internal/private CA used for? A. Public trust B. Medium/large org internal devices C. No client certs D. Must be cloud-hosted
Correct answer: B. Medium/large org internal devices Explanation (concise): An internal/private CA is used within an organization to issue certificates for internal devices, users, or services. It’s ideal for medium to large organizations that need control over their own certificate infrastructure. It is not intended for public trust, doesn’t prohibit client certificates, and doesn’t have to be cloud-hosted. Mnemonic: “Private CA = Protect Internal.” Used to secure internal communications and devices.
121
Use-case for self-signed certs? A. Public web B. Internal systems C. Public email D. Code signing
Correct answer: B. Internal systems Explanation (concise): Self-signed certificates are typically used for internal systems where trust is manually established, such as test environments, internal servers, or dev/test labs. They are not trusted publicly, so they are unsuitable for public websites, email, or widely distributed code signing. Mnemonic: “Self-signed = Safe Inside.” Best for internal use where external trust isn’t required.
122
After creating internal CA, what must be done? A. Use RSA B. Install CA root cert C. Disable TLS 1.2 D. Use wildcard certs
Correct answer: B. Install CA root cert Explanation (concise): After creating an internal CA, the root certificate must be installed on all systems that need to trust the CA. This ensures that certificates issued by the internal CA are recognized as valid. RSA, TLS settings, or wildcard certificates are separate considerations. Mnemonic: “Root first = Trust works.” Installing the root cert establishes trust for all issued certificates.
123
SAN field used for? A. Store private key B. Additional identities C. Key length D. OCSP responders
Correct answer: B. Additional identities Explanation (concise): The Subject Alternative Name (SAN) field in a certificate allows inclusion of additional identities such as multiple domain names, subdomains, or IP addresses. It does not store private keys, define key length, or list OCSP responders. Mnemonic: “SAN = Several Addresses Named.” SAN extends the certificate to cover multiple identities.
124
Wildcard cert for *.example.com covers? A. Any TLD B. All subdomains C. Only www D. Subnets
Correct answer: B. All subdomains Explanation (concise): A wildcard certificate for *.example.com secures all subdomains of example.com (like mail.example.com or shop.example.com) but does not cover different top-level domains (TLDs), only www, or network subnets. Mnemonic: “ = All Subdomains.”* The asterisk in a wildcard cert matches every subdomain of the main domain.
125
CRL is what? A. Browser store B. CA-maintained revoked list C. Expired cert list D. DNSSEC replacement
Correct answer: B. CA-maintained revoked list Explanation (concise): A Certificate Revocation List (CRL) is a list maintained by a Certificate Authority (CA) that contains certificates that have been revoked before their expiration date. It is used to check if a certificate is no longer trustworthy. Mnemonic: “CRL = Check Revoked List.” CRL tells systems which certificates should no longer be trusted.
126
A security analyst is reviewing the impact of the Heartbleed vulnerability on their organization’s web servers. Heartbleed allows attackers to read server memory, potentially exposing private keys, session tokens, and sensitive data. The analyst must take steps to secure communications and prevent compromise. Question: What is the primary remediation step for Heartbleed? A. No impact B. Revoke and reissue certificates C. Only Certificate Authorities affected D. Only symmetric keys affected
Correct answer: B. Revoke and reissue certificates Explanation: Heartbleed can expose private keys used in TLS/SSL certificates. To restore trust, affected certificates must be revoked and reissued. Simply assuming no impact, or that only CAs or symmetric keys are affected, is incorrect. Mnemonic: “Heartbleed = Heart needs new keys.” Vulnerable servers require new certificates to regain secure communications.
127
A company’s website receives complaints from customers saying their browsers are warning that the site’s TLS certificate may be revoked. The security analyst wants a faster method than downloading a full CRL to confirm whether the TLS certificate is still valid. The analyst uses a mechanism that allows the browser to query the Certificate Authority in real time to check the certificate’s status before completing the secure connection. Question OCSP allows? A. Real-time status check B. Issuing keys C. Reset passwords D. DNS verification
Correct Answer: A. Real-time status check Explanation (concise) OCSP (Online Certificate Status Protocol) lets a client check the revocation status of a certificate in real time by contacting the CA’s OCSP responder. • B CAs issue keys/certs, not OCSP • C Password resets are unrelated • D DNS verification is DNSSEC, not OCSP ⸻ Mnemonic “O-C-S-P = Online Check Status Protocol.” → OCSP = online + status check.
128
Why OCSP stapling? A. Replace CAs B. Reduce CA load C. Remove TLS D. Remove CRLs
Correct Answer: B. Reduce CA load Explanation (concise) OCSP stapling lets the server fetch and “staple” a recent OCSP response to its TLS handshake. This avoids every client having to contact the Certificate Authority individually. Benefits: • Reduces CA/OCSP responder load • Improves performance • Protects privacy (clients don’t reveal what sites they visit) • Still verifies revocation status Why the others are wrong: • A It does not replace CAs. • C It does not remove TLS; it’s part of TLS. • D It doesn’t eliminate CRLs, just reduces reliance on them. Mnemonic “Stapling = Server handles Status.” → The server does the OCSP check to reduce load on the CA.
129
A user visits a secure website. During the TLS handshake, the browser receives a signed OCSP response directly from the server, confirming the certificate’s revocation status without contacting the Certificate Authority. This improves speed and reduces privacy leakage because the browser doesn’t need to reach out to the CA itself. Question Browser gets signed OCSP in handshake? A. CRL B. OCSP stapling C. Forward secrecy D. HSTS
Correct Answer: B. OCSP stapling Explanation (concise) OCSP stapling = the server “staples” a signed OCSP status into the TLS handshake so the browser doesn’t need to query the CA. • A CRL = full list downloaded, not in handshake • C Forward secrecy = ephemeral keys, unrelated • D HSTS = forces HTTPS, not OCSP ⸻ Mnemonic “Stapled Status in the Shake.” → OCSP stapling = status stapled into the TLS handshake.
130
A company issues laptops to remote employees. Management is worried that if a laptop is lost or stolen, an attacker could remove the drive and read sensitive client data. The security engineer recommends a control that automatically encrypts the entire drive, including system files, swap space, temporary files, and user data, so nothing on the disk is readable without proper authentication at boot. Question Full-disk encryption is? A. Encrypt rows B. Encrypt all volume data C. Encrypt transit only D. Hash passwords
Correct Answer: B. Encrypt all volume data Explanation (concise) Full-disk encryption (FDE) protects the entire storage volume, so if the device is stolen, the data can’t be accessed. • A Row encryption = database feature • C Transit encryption = protects data over the network • D Hashing passwords = authentication control ⸻ Mnemonic “FDE = Full Drive Encrypted.” → Everything on the drive is protected.
131
A company stores sensitive customer records in a SQL database. The security architect wants a method that ensures data inside the database files and backups cannot be read if an attacker steals the storage media or accesses raw database files. The control should protect the contents of tables, indexes, and backups, regardless of the operating system. Question What does database encryption accomplish? A. Encrypts data only at rest B. Protects stored data and backups within the database files C. Encrypts only database logs D. Eliminates the need for TLS during data transmission
Correct Answer: B. Protects stored data and backups within the database files Explanation (concise) Database encryption protects the data stored inside the database structure (tables, indexes, backups). It does not remove the need for TLS in transit and does not focus solely on logs.
132
A company wants to encrypt its database to protect sensitive data, but the development team cannot modify the application code. The security engineer suggests a method that encrypts the database at the storage level while allowing applications to continue reading and writing data without any code changes. Question Transparent encryption is? A. Requires application changes B. Database encrypted without application change C. Encrypts only logs D. Uses asymmetric encryption only
Correct Answer: B. Database encrypted without application change Explanation (concise) Transparent Data Encryption (TDE) allows the database to be encrypted at rest without requiring modifications to the application. Applications read/write normally; encryption/decryption happens behind the scenes. • A Wrong — no app changes are needed • C Wrong — it encrypts full database, not just logs • D Wrong — TDE typically uses symmetric keys ⸻ Mnemonic “Transparent = Transparent to the App.” → App doesn’t notice the encryption.
133
A company handles highly sensitive customer records in a large database. Security wants to ensure that even if one table or row is accessed by an unauthorized user, only that individual record is unreadable, without encrypting the entire database. Question Record-level encryption encrypts? A. The whole database B. Individual rows or records C. Backups only D. Metadata only
Correct Answer: B. Individual rows or records Explanation (concise) Record-level encryption encrypts specific rows or records, allowing fine-grained protection. It protects sensitive data without the overhead of encrypting the full database. • A Whole DB = full-disk or TDE • C Backups only = backup encryption • D Metadata = does not protect actual data ⸻ Mnemonic “Row = Record” → Only the row/record is encrypted, not the entire database.
134
A database stores multiple types of sensitive data in different columns: social security numbers, credit card numbers, and personal emails. The security architect wants different encryption keys for each column to ensure that if one key is compromised, only that column’s data is exposed, while other columns remain secure. Question Why use separate keys per column? A. To allow sorting B. For granular protection C. For simpler management D. For better compression
Correct Answer: B. For granular protection Explanation (concise) Using separate keys for each column provides granular security, limiting the impact of a key compromise to only that column. • A Sorting is unrelated • C Management becomes more complex, not simpler • D Compression is unrelated ⸻ Mnemonic “Column = Compartmentalize” → Each column gets its own key for granular protection.
135
A company transmits sensitive customer data over the internet. The security team wants to ensure that data cannot be intercepted or read during transit between the client’s browser and the web server. Question Which is an example of transport encryption? A. BitLocker B. HTTPS C. Hashing D. Tokenization
Correct Answer: B. HTTPS Explanation (concise) Transport encryption protects data while moving over networks. HTTPS (HTTP over TLS/SSL) encrypts traffic between the client and server. • A BitLocker = full-disk encryption (at rest) • C Hashing = one-way data transformation • D Tokenization = replaces sensitive data with a token ⸻ Mnemonic “Transport = Transit” → HTTPS encrypts data in transit.
136
A company has remote employees accessing sensitive internal systems from home and public Wi-Fi. Management wants all traffic between remote devices and the corporate network encrypted, protecting it from eavesdropping and interception. Question Which ensures all remote traffic is encrypted? A. Full disk encryption B. VPN C. Hashing emails D. SAN certificate
Correct Answer: B. VPN Explanation (concise) A VPN (Virtual Private Network) encrypts all traffic between the remote device and the corporate network, creating a secure tunnel over untrusted networks. • A Full disk = protects data at rest • C Hashing emails = protects integrity, not traffic • D SAN certificate = secures TLS for multiple domains, not all remote traffic ⸻ Mnemonic “VPN = Virtual Private Network = Everything Encrypted.” → All remote traffic goes through the encrypted tunnel.
137
A company has two branch offices and wants to securely connect their entire networks over the internet so that devices in both offices can communicate as if they were on the same LAN. Question Site-to-site VPN typically uses which protocol? A. IPsec B. HTTP C. FTP D. SMTP
Correct Answer: A. IPsec Explanation (concise) IPsec (Internet Protocol Security) is commonly used for site-to-site VPNs, encrypting traffic between entire networks over untrusted networks. • B HTTP = web traffic, not VPN • C FTP = file transfer only • D SMTP = email only ⸻ Mnemonic “Site-to-Site = IPsec Inside.” → IPsec secures network-to-network VPN connections.
138
Two devices are establishing a secure TLS connection. Before encrypting any data, they must agree on which encryption and hashing algorithms to use to ensure both sides can communicate securely. Question Algorithm negotiation during a secure session means? A. One algorithm only B. Both sides agree C. Secret algorithms D. Manual selection
Correct Answer: B. Both sides agree Explanation (concise) Algorithm negotiation allows both parties to agree on compatible cryptographic algorithms (cipher, key exchange, hash) before communication begins. • A One algorithm only = too rigid, may not be compatible • C Secret algorithms = not the purpose of negotiation • D Manual selection = negotiation is automatic in protocols like TLS ⸻ Mnemonic “Negotiate = Nod Together.” → Both sides must agree on the algorithms.
139
A company wants to implement encryption for its database and network traffic. The security engineer must balance performance, security, and implementation effort when selecting algorithms, key lengths, and protocols. Question Which describes cryptography tradeoffs? A. Voltage B. Security, speed, complexity C. Monitor specs D. MAC/IP
Correct Answer: B. Security, speed, complexity Explanation (concise) Cryptography involves tradeoffs between: • Security – strength of encryption • Speed/Performance – how fast encryption/decryption occurs • Complexity/Management – difficulty of implementation and key management • A Voltage = irrelevant • C Monitor specs = unrelated • D MAC/IP = networking terms, not crypto tradeoffs ⸻ Mnemonic “Crypto = SSC” → Security, Speed, Complexity → Pick the right balance for your environment.
140
A security engineer is designing an encryption system. The team must identify which parts of the system are meant to remain secret and which can be public without compromising security. Question In cryptography, which is NOT meant to be secret? A. Key B. Algorithm C. Plaintext D. Random source
Correct Answer: B. Algorithm Explanation (concise) According to Kerckhoffs’s Principle, the security of a system should rely only on the secrecy of the key, not the algorithm. • Keys must remain secret • Algorithms are public and can be widely analyzed • Plaintext may be sensitive but could be known • Random sources for keys must remain private ⸻ Mnemonic “Algorithm = Always Public” → Keys are secret, algorithms are not.
141
A security engineer is implementing encryption for sensitive files. The engineer explains that the key is critical because it controls how plaintext is transformed into ciphertext, and without the correct key, the data cannot be decrypted. Question Why is the cryptographic key important? A. Chooses the hash B. Determines output C. Replaces passwords D. Configures DNS
Correct Answer: B. Determines output Explanation (concise) The key directly affects the ciphertext output. Even with the same algorithm, different keys produce different ciphertexts. Without the correct key, decryption is impossible. • A Choosing a hash = not the key’s role • C Replacing passwords = unrelated • D Configures DNS = unrelated ⸻ Mnemonic “Key = Key to Output” → The key determines the encrypted result.
142
A company is evaluating encryption algorithms and key lengths for its VPN. The security team knows that longer keys make brute-force attacks more difficult, but very long keys can slightly affect performance. Question Which statement about key length is true? A. Short keys are more secure B. Longer keys = stronger security C. Key length has no effect D. Key length only matters for hashing
Correct Answer: B. Longer keys = stronger security Explanation (concise) Longer keys increase the number of possible combinations, making brute-force attacks more difficult. • A Short keys = weaker, not secure • C Key length definitely affects security • D Key length matters for encryption, not just hashing ⸻ Mnemonic “Long Key = Strong Lock” → Longer key = harder to break.
143
A security engineer is selecting a symmetric encryption algorithm for a corporate VPN. The team wants a key size that is secure enough against brute-force attacks today. Question What is a common symmetric key size? A. 56 bits B. 64 bits C. 128 bits or higher D. 20 bits
Correct Answer: C. 128+ Explanation (concise) Modern symmetric algorithms like AES use 128, 192, or 256-bit keys. These provide strong security against brute-force attacks. • A 56 bits = DES (outdated, insecure) • B 64 bits = too small, vulnerable • D 20 bits = extremely weak ⸻ Mnemonic “AES = Always 128+” → Symmetric keys today are 128 bits or longer.
144
A company is comparing symmetric and asymmetric encryption. The security engineer explains that asymmetric encryption requires much larger keys to provide equivalent security because the underlying math is more complex. Question Why do asymmetric algorithms need larger keys? A. Weak math B. Only hashing C. Prime factorization is harder D. No hardware support
Correct Answer: C. Prime factorization is harder Explanation (concise) Asymmetric algorithms (like RSA) rely on hard mathematical problems such as prime factorization. To achieve equivalent security to symmetric encryption, larger keys are required because the math is more computationally intensive to break. • A Weak math = incorrect • B Only hashing = unrelated • D No hardware = irrelevant ⸻ Mnemonic “Asymmetric = Big Keys for Hard Math” → Hard math (prime factorization) = need bigger keys.
145
A security engineer is designing a system for storing user passwords. To make weak passwords harder to crack, the engineer applies a technique that applies a hash function multiple times to increase the computational effort required for brute-force attacks. Question Key stretching involves? A. Adding bits to the key B. Repeated hashing C. Compressing the key D. Rotating keys
Correct Answer: B. Repeated hashing Explanation (concise) Key stretching strengthens weak keys (like passwords) by repeatedly hashing them, increasing the time required for an attacker to attempt brute-force attacks. • A Adding bits = not typical key stretching • C Compressing = unrelated • D Rotating keys = key management, not stretching ⸻ Mnemonic “Stretch = Hash Again & Again” → Repeated hashing makes weak keys stronger.
146
A company stores password hashes in its authentication system. The security engineer applies key stretching, using thousands of hash iterations for each password. Question What is the primary effect of key stretching? A. Confidentiality B. Slows brute-force attacks C. Integrity D. Availability
Correct Answer: B. Slows brute-force attacks Explanation (concise) Key stretching increases computational effort for each password attempt, making brute-force or dictionary attacks slower and more difficult. • A Confidentiality = general data protection • C Integrity = ensures data isn’t altered • D Availability = unrelated ⸻ Mnemonic “Stretch = Slow Attack” → Repeated hashing slows brute-force attempts.
147
A company wants to use symmetric encryption to secure communications between two offices. The challenge is how to share the encryption key over an insecure network without exposing it to attackers. Question What is the main problem that key exchange solves? A. Compress files B. Share the key safely C. Store logs D. Rotate passwords
Correct Answer: B. Share the key safely Explanation (concise) Key exchange algorithms (like Diffie-Hellman) allow two parties to establish a shared secret key over an insecure channel without transmitting the key in plaintext. • A Compressing files = unrelated • C Storing logs = unrelated • D Rotating passwords = key management, not exchange ⸻ Mnemonic “Key Exchange = Safe Sharing” → Solve the problem of sharing a secret key securely.
148
A company wants to securely share a secret encryption key with a partner. Instead of sending it over the internet, they deliver the key via a trusted physical medium, ensuring attackers monitoring the network cannot intercept it. Question Which is an example of out-of-band key exchange? A. TLS B. USB courier C. Server public key D. Same email
Correct Answer: B. USB courier Explanation (concise) Out-of-band key exchange uses a separate, trusted channel to share keys. A USB delivered by courier ensures the key isn’t exposed over the insecure network. • A TLS = in-band, over network • C Server public key = in-band asymmetric exchange • D Same email = still in-band ⸻ Mnemonic “Out-of-Band = Outside the Network” → Use a separate channel, like physical delivery, for key exchange.
149
A client wants to start a secure session with a web server. The client sends a session key encrypted with the server’s public key over the network to establish symmetric encryption for the session. Question Which is an example of in-band key exchange using asymmetric cryptography? A. Phone call B. Encrypt session key with server public key C. USB courier D. DNS
Correct Answer: B. Encrypt session key with server public key Explanation (concise) In-band asymmetric key exchange transmits the key over the same network channel using asymmetric encryption. The client encrypts the session key with the server’s public key, so only the server can decrypt it. • A Phone call = out-of-band • C USB courier = out-of-band • D DNS = not typically used for secure key exchange ⸻ Mnemonic “In-Band = Encrypt Over the Channel” → Use asymmetric encryption to send keys safely through the network.
150
A client and server establish a secure connection. They generate a unique encryption key that is used only for the duration of this session to encrypt all communication between them. Question What is a session key? A. Long-term key B. Temporary symmetric key C. Hash-only key D. Asymmetric key
Correct Answer: B. Temporary symmetric key Explanation (concise) A session key is: • Temporary – used only for a single session • Symmetric – both parties use the same key for encryption and decryption • A Long-term key = master key or private key • C Hash-only = not used for encryption • D Asymmetric key = used for key exchange, not for session data encryption ⸻ Mnemonic “Session Key = Short & Symmetric” → Temporary symmetric key for one session.
151
A company wants to encrypt large amounts of data in real time for streaming video. The encryption method must maintain high speed and throughput while still protecting the data. Question Which choice is best when fast encryption is needed? A. Short keys B. Keep throughput high C. Skip authentication D. Avoid symmetric encryption
Correct Answer: B. Keep throughput high Explanation (concise) Fast encryption prioritizes high throughput, often using symmetric algorithms (like AES) optimized for performance. • A Short keys = insecure • C Skipping authentication = compromises integrity • D Avoiding symmetric = slows down encryption (asymmetric is slower) ⸻ Mnemonic “Fast = Flowing Data” → Keep throughput high for fast encryption.
152
A company wants to implement a system that issues, manages, and validates digital certificates to enable secure communications. The system includes policies, procedures, people, and hardware to manage the lifecycle of certificates. Question What is PKI? A. TLS server B. Policies, people, hardware C. Password rules D. VPN
Correct Answer: B. Policies, people, hardware Explanation (concise) Public Key Infrastructure (PKI) is the framework that includes: • Policies for certificate management • People to manage operations • Hardware/software for issuing, storing, and revoking certificates • A TLS server = just one component • C Password rules = unrelated • D VPN = unrelated ⸻ Mnemonic “PKI = Policy, People, Infrastructure” → It’s the system managing digital certificates.
153
A company issues digital certificates to its employees and servers. These certificates link a public key to a specific individual or device, allowing others to verify identities and trust communications. Question PKI binds public keys to? A. IP addresses B. People or devices C. MAC addresses D. Random numbers
Correct Answer: B. People or devices Explanation (concise) PKI certificates associate a public key with a verified entity, such as a person or device, ensuring authenticity in communications. • A IP addresses = not unique to identity • C MAC addresses = network layer, not identity • D Random numbers = meaningless for identification ⸻ Mnemonic “PKI = Public Key for People/Devices” → Binds keys to verified entities.
154
A company needs to encrypt large volumes of internal data quickly. The security engineer recommends an encryption method where the same key is used to encrypt and decrypt data, allowing fast and efficient protection. Question Which describes symmetric encryption? A. Uses two keys B. Uses one shared key C. Slower than asymmetric D. Not secret
Correct Answer: B. Uses one shared key Explanation (concise) Symmetric encryption uses a single shared key for both encryption and decryption. It is fast and efficient for large datasets. • A Two keys = asymmetric encryption • C Slower = symmetric is faster than asymmetric • D Not secret = the key must remain secret ⸻ Mnemonic “Symmetric = Same Key” → One key for both encrypting and decrypting.
155
A company has multiple offices needing secure communication. Each office must share a unique symmetric key with every other office. As the number of offices grows, managing all the shared keys becomes complex and error-prone. Question What is a common scaling issue with symmetric encryption? A. Too fast B. Too many shared secrets C. No encryption at rest D. Cannot use over networks
Correct Answer: B. Too many shared secrets Explanation (concise) Symmetric encryption requires one shared key per pair of communicating parties. As the number of parties grows, the number of keys increases exponentially, making key management difficult. • A Too fast = not a problem • C Encryption at rest = unrelated • D Network use = symmetric can be used over networks ⸻ Mnemonic “Symmetric = Secret Explosion” → Many parties → too many shared keys.
156
A company implements public key encryption for secure email. Each user has two keys: one public and one private. Data encrypted with one key can only be decrypted with the other. Question Asymmetric encryption uses? A. Identical keys B. Mathematically related keys C. Only symmetric keys D. One key ⸻
Correct Answer: B. Mathematically related keys Explanation (concise) Asymmetric encryption uses a key pair: a public key and a private key that are mathematically related. One key encrypts, and the other decrypts. • A Identical keys = symmetric encryption • C Only symmetric = incorrect • D One key = symmetric only ⸻ Mnemonic “Asymmetric = A Pair that Matches Mathematically” → Public key + private key. Mathematically” → Public key + private key.
157
A user generates a public/private key pair for secure email. The public key can be shared with anyone, but the private key must be kept confidential to decrypt messages sent to the user. Question What should you do with a private key? A. Share it with others B. Keep it secret C. Store it in DNS D. Same as the public key
Correct Answer: B. Keep it secret Explanation (concise) The private key is used to decrypt data or sign messages. If it is exposed, anyone could impersonate the key owner or decrypt sensitive messages. • A Sharing = defeats security • C DNS storage = insecure • D Same as public = incorrect ⸻ Mnemonic “Private = Protected” → Never share your private key.
158
A user wants to send an encrypted message to a colleague. They use the colleague’s public key to encrypt the message so that only the colleague can decrypt it with their private key. The colleague can also use their private key to sign a message, which others can verify with the public key. Question A public key is used to? A. Decrypt itself B. Encrypt to the user / verify signatures C. Store secrets D. Replace passwords
Correct Answer: B. Encrypt to user / verify signature Explanation (concise) • Public key encrypts data that only the matching private key can decrypt. • Public key verifies digital signatures created with the private key. • A Decrypt itself = incorrect • C Store secrets = unrelated • D Replace passwords = unrelated ⸻ Mnemonic “Public = Protect & Prove” → Encrypt for someone / verify their signature.
159
A security engineer is generating an RSA key pair for secure communications. The process requires choosing unpredictable numbers that will create a mathematically secure public/private key pair. Question What is required for key pair generation? A. Sequential numbers B. Random numbers + large primes C. Identical keys D. Simple math
Correct Answer: B. Random numbers + large primes Explanation (concise) • Asymmetric key pairs (e.g., RSA) rely on large prime numbers and randomness to ensure security. • Sequential numbers or simple math would make the key predictable. • Keys are not identical; the public and private key are related mathematically but distinct.
160
A company wants to ensure encrypted data can be recovered if a key is lost or an employee leaves. They use a system where a trusted third party securely holds a copy of the encryption keys for recovery purposes. Question What is key escrow? A. Password backup B. Third-party holds keys C. Publish keys publicly D. AES encrypt keys
Correct Answer: B. Third-party holds keys Explanation (concise) Key escrow is a mechanism where a trusted third party securely stores encryption keys so that encrypted data can be recovered if the original key is lost. • A Password backup = unrelated • C Publishing keys = defeats security • D AES encrypt keys = just encryption, not escrow ⸻ Mnemonic “Escrow = Extra Copy Held Safely” → A trusted party keeps a backup of keys.
161
A company uses key escrow to ensure data recovery. Security leadership worries about potential risks if the third party holding the keys is compromised or untrustworthy. Question What is a primary concern with key escrow? A. Key length B. Third party must be trusted C. TLS breaks D. Shorter keys
Correct Answer: B. Third party must be trusted Explanation (concise) Key escrow relies on a third party to securely store keys. If that party is untrustworthy or compromised, sensitive data could be exposed. • A Key length = not specific to escrow • C TLS breaks = unrelated • D Shorter keys = unrelated ⸻ Mnemonic “Escrow = Entrust Carefully” → The third party must be trustworthy.
162
A company implements PKI for secure communications. The security team emphasizes following proper processes for issuing, revoking, and managing certificates to ensure keys and certificates aren’t misused. Question Why is following the PKI process important? A. Regenerate keys only B. Prevent misuse of keys and certificates C. Replace technology D. Optional
Correct Answer: B. Prevent misuse of keys and certificates Explanation (concise) PKI processes (issuance, revocation, and management) ensure keys and certificates are used appropriately and reduce the risk of compromise or unauthorized use. • A Regenerate keys = part of process, not the main purpose • C Replace technology = unrelated • D Optional = incorrect ⸻ Mnemonic “PKI = Process Keeps It safe” → Following PKI procedures prevents misuse.
163
Bob wants to send a confidential message to Alice. He uses Alice’s public key to encrypt the message so that only Alice can decrypt it with her private key, ensuring confidentiality. Question In Bob → Alice encryption, which flow is correct? A. Bob private → Bob private B. Bob encrypts with Alice public; Alice decrypts with Alice private C. Bob public → Alice public D. Symmetric only
Correct Answer: B. Bob encrypts with Alice public; Alice decrypts with Alice private Explanation (concise) • Public key encryption allows anyone to encrypt a message using the recipient’s public key. • Only the recipient’s private key can decrypt it, ensuring confidentiality. • A Bob private → Bob private = incorrect • C Bob public → Alice public = incorrect, public keys alone cannot decrypt • D Symmetric only = not asymmetric encryption ⸻ Mnemonic “Encrypt with recipient’s public, decrypt with recipient’s private” → Only the intended recipient can read it.
164
Front
Back
165
AAA
Authentication, Authorization, and Accounting: A framework for controlling access to resources, enforcing policies, auditing usage, and billing for services.
166
ACL
Access Control List: A table that tells an OS which access rights each user has to a specific object.
167
AES
Advanced Encryption Standard: A symmetric encryption algorithm used worldwide to secure data.
168
AES-256
Advanced Encryption Standard 256-bit: AES using a 256-bit key for stronger encryption.
169
AH
Authentication Header: Part of IPsec providing authentication and integrity.
170
AI
Artificial Intelligence: Simulation of human intelligence processes by machines.
171
AIS
Automated Indicator Sharing: System allowing cyber threat indicator exchange.
172
ALE
Annualized Loss Expectancy: Expected monetary loss for an asset per year.
173
AP
Access Point: Device allowing Wi‑Fi devices to connect to a wired network.
174
API
Application Programming Interface: Functions/procedures enabling applications to access OS or service features.
175
APT
Advanced Persistent Threat: Long-term targeted cyberattack where an intruder stays undetected.
176
ARO
Annualized Rate of Occurrence: Expected frequency of an event per year.
177
ARP
Address Resolution Protocol: Discovers the link-layer address for an IP address.
178
ASLR
Address Space Layout Randomization: Technique preventing memory corruption exploitation.
179
ATT&CK
Adversarial Tactics, Techniques, and Common Knowledge: MITRE framework describing adversary behavior.
180
AUP
Acceptable Use Policy: Rules and guidelines for proper use of an organization’s IT.
181
AV
Antivirus: Software designed to detect and destroy viruses.
182
BASH
Bourne Again Shell: Unix shell and command language.
183
BCP
Business Continuity Planning: Creating systems of prevention and recovery from threats.
184
BGP
Border Gateway Protocol: Routes information across the internet.
185
BIA
Business Impact Analysis: Identifies/evaluates effects of natural or man-made events on operations.
186
BIOS
Basic Input/Output System: Firmware for hardware initialization during boot.
187
BPA
Business Partners Agreement: Contract between parties sharing resources for a mutual project.
188
BPDU
Bridge Protocol Data Unit: Network message transmitted by a LAN bridge.
189
BYOD
Bring Your Own Device: Policy allowing employees to use personal devices for work.
190
CA
Certificate Authority: Entity issuing digital certificates.
191
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart: Challenge-response test determining whether the user is human.
192
CAR
Corrective Action Report: Report outlining necessary steps to fix non-conformance.
193
CASB
Cloud Access Security Broker: Enforces security policies between cloud consumers and providers.
194
CBC
Cipher Block Chaining: Block cipher mode providing confidentiality.
195
CCMP
Counter Mode/CBC-MAC Protocol: Wi‑Fi encryption protocol.
196
CCTV
Closed-circuit Television: Non-public TV system for surveillance.
197
CERT
Computer Emergency Response Team: Expert group handling cybersecurity incidents.
198
CFB
Cipher Feedback: Block cipher mode.
199
CHAP
Challenge Handshake Authentication Protocol: Authentication protocol validating a user or host.
200
CIA
Confidentiality, Integrity, Availability: Framework guiding security policies.
201
CIO
Chief Information Officer: Senior executive responsible for IT systems supporting enterprise goals.
202
CIRT
Computer Incident Response Team: Organization contacted during cyber emergencies.
203
CMS
Content Management System: Software enabling content creation and management without technical expertise.
204
COOP
Continuity of Operation Planning: Ensures critical functions continue during emergencies.
205
COPE
Corporate Owned, Personally Enabled: Strategy allowing personal use of corporate-owned devices.
206
CP
Contingency Planning: Actions for responding to significant future events.
207
CRC
Cyclical Redundancy Check: Error-detecting code to detect changes to raw data.
208
CRL
Certificate Revocation List: List of certificates revoked by an issuing authority.
209
CSO
Chief Security Officer: Executive responsible for security of personnel, physical assets, and information.
210
CSP
Cloud Service Provider: Company offering IaaS, SaaS, or PaaS.
211
CSR
Certificate Signing Request: Message sent to a CA to apply for a certificate.
212
CSRF
Cross-Site Request Forgery: Malicious exploit sending unauthorized commands from a trusted user session.
213
CSU
Channel Service Unit: Device for digital data transmission interfacing a data terminal.
214
CTR
Counter Mode: Block cipher mode in cryptography.