100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ISC2 Certified In Cybersecurity: Chapter 1 Questions And Answers With Complete Solutions 100% Correct | 2024 $13.99   Add to cart

Exam (elaborations)

ISC2 Certified In Cybersecurity: Chapter 1 Questions And Answers With Complete Solutions 100% Correct | 2024

 15 views  0 purchase
  • Course
  • Institution

ISC2 Certified In Cybersecurity: Chapter 1 Questions And Answers With Complete Solutions 100% Correct | 2024 The National Institute of Standards and Technology defines _____ as the characteristic of data or information when it is not made available or disclosed to unauthorized persons or process...

[Show more]

Preview 2 out of 12  pages

  • March 11, 2024
  • 12
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
ISC2 Certified In Cybersecurity: Chapter 1
Questions And Answers With Complete Solutions
100% Correct | 2024
The National Institute of Standards and Technology defines _____ as the characteristic of data or
information when it is not made available or disclosed to unauthorized persons or processes. NIST SP
800-66

Confidentiality

A term pertaining to any data about an individual that could be used to identify them.

Personally Identifiable Information (PII)

A term referring to information regarding one's health status.

Protected Health Information (PHI)

What measures the degree to which something is whole and complete, internally consistent and
correct?

Integrity

_____ _____ is the assurance that data has not been altered in an unauthorized manner.

Data Integrity

_____ _____ refers to the maintenance of a known good configuration and expected operational
function as the system processes the information.

System Integrity

The quality that a system has when it performs its intended function in an unimpaired manner, free
from unauthorized manipulation of the system, whether intentional or accidental. NIST SP 800-27 Rev.
A

System Integrity

The property that data has not been altered in an unauthorized manner. This covers data in storage,
during processing and while in transit. NIST SP 800-27 Rev. A

Data Integrity

The condition an entity is at a point in time.

State

A documented, lowest level of security configuration allowed by a standard or organization.

Baseline

, Integrity of data or system can always be ascertained by comparing the _____ with the current _____.

Baseline and State

If the two match, then the integrity of the data or the system is intact; if they two do not match, then the
integrity of hte data or the system has been compromised.

What is a measure of the importance assigned to information by its owner, or the purpose of denoting
its need for protection? NIST SP 800-60 Vol 1 Rev 1

Sensitivity

_____ information is information that if improperly disclosed (confidentiality) or modified (integrity)
would harm an organization or individual.

Sensitive

What can be defined as timely and reliable access to information and the ability to use it by authorized
users?

Availability

A measure of the degree to which an organization depends on the information or information system
for the success of a mission or of a business function. NIST SP 800-60 Vol 1 Rev 1

Criticality

To define security, it has become common to use the CIA Triad. Define the CIA Triad.

Confidentiality
Integrity
Availability

Access control process validating that the identity being claimed by a user or entity is known to the
system by comparing one or more factors of identification.

Authentication

When users have stated their identity, it is necessary to validate that they are the rightful owners of
that identity. This process of verifying or proving the user's identification is known as _____.

Authentication

What are the common methods of authentication?

1. Something you know (Knowledge-Based)
2. Something you have (Token-Based)
3. Something you are (Characteristics-Based)

Something you know authentication methods.

Passwords, Paraphrases, PIN (Personal Identification Number), Secret Code

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ACADEMICAIDSTORE. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75759 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.99
  • (0)
  Add to cart