1.
Which of the following contains the primary goals and objectives of security?
- A.A network’s border perimeter
- B.The CIA Triad
- C.A stand-alone system
- D.The Internet
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
The primary goals and objectives of security are confidentiality, integrity, and availability, commonly referred to as the CIA Triad . |
2.
Vulnerabilities and risks are evaluated based on their threats against which of the
following?
- A.One or more of the CIA Triad principles
- B.Data usefulness
- C.Due care
- D.Extent of liability
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
Vulnerabilities and risks are evaluated based on their threats against one or more of the CIA Triad principles. |
3.
Which of the following is a principle of the CIA Triad that means authorized subjects are
granted timely and uninterrupted access to objects?
- A.Identification
- B.Availability
- C.Encryption
- D.Layering
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
Availability means that authorized subjects are granted timely and uninterrupted access to objects. |
4.
Which of the following is not considered a violation o t f confidentiality?
- A.Stealing passwords
- B.Eavesdropping
- C.Hardware destruction
- D.Social engineering
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Hardware destruction is a violation of availability and possibly integrity. Violations of confidentiality include capturing network traffic, stealing password files, social engineering, port scanning, shoulder surfing, eavesdropping, and sniffing. |
5.
Which of the following is not true?
- A.Violations of confidentiality include human error.
- B.Violations of confidentiality include management oversight.
- C.Violations of confidentiality are limited to direct intentional attacks
- D.Violations of confidentiality can occur when a transmission is not properly encrypted
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Violations of confidentiality are not limited to direct intentional attacks. Many instances of unauthorized disclosure of sensitive or confidential information are due to human error, oversight, or ineptitude. |