The cia triad is - Study guides, Class notes & Summaries
Looking for the best study guides, study notes and summaries about The cia triad is? On this page you'll find 1001 study documents about The cia triad is.
Page 4 out of 1.001 results
Sort by
-
CompTIA Security+ (SY0-601) questions with correct answers
- Exam (elaborations) • 90 pages • 2024
- Available in package deal
-
- $15.99
- + learn more
CIA Triad Correct Answer-Confidentially, Integrity and Availability. 
 
Least privilege /Need-to-know basis Correct Answer-Giving someone the most limited access required to so they can perform their job. 
 
Defence in Depth Correct Answer-Protecting a company's data with a series of protective layers. 
 
Annual Risk Assessment Correct Answer-A risk register where the financial director will look at all of the risks associated with money and the IT manager will look at all of the risks posed. 
...
-
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY EXAM 2024
- Exam (elaborations) • 10 pages • 2024
-
- $15.49
- + learn more
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY EXAM 2024 
 
 
Define the confidentiality in the CIA triad. - correct answer Our ability to protect data from those who are not authorized to view it. 
 
Examples of confidentiality - correct answer A patron using an ATM card wants to keep their PIN number confidential. 
An ATM owner wants to keep bank account numbers confidential. 
 
How can confidentiality be broken? - correct answer Losing a laptop 
An attacker gets access to info 
A person can l...
-
(ISC)2 CC Practice Exam 1(QUESTIONS WITH 100% CORRECT ANSWERS ) (2024 / 2025) (Verified by Experts)
- Exam (elaborations) • 27 pages • 2024
- Available in package deal
-
- $18.49
- + learn more
Sensitivity is a measure of the ...: - ANSWER ... importance assigned to information by its owner, or the purpose of representing its need for protection. 
 
(Sensitivity is also defined as the measure of the importance assigned to information by its owner, or the purpose of representing its need for protection) 
 
The process of verifying or proving the user's identification is known as: - ANSWER Authentication 
 
(Authentication is the verification of the identity of a user, process or ...
-
WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW (2024) || With Complete Solutions (100% Verified)
- Exam (elaborations) • 21 pages • 2024
-
Available in package deal
-
- $13.99
- + learn more
WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW (2024) || With Complete Solutions (100% Verified) 
WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW (2024) || With Complete Solutions (100% Verified) 
 
The Fabrication attack type most commonly affects which principle(s) of the CIA triad? 
 
A. Availability 
B. Integrity 
C. Confidentiality 
D. Integrity and Availability 
E. Confidentiality and Integrity - ANSWER - Integrity and Availability 
 
The Interception attack type most commonly affects which...
-
Fundamentals of Information Security Questions & Answers(SCORED A+)
- Exam (elaborations) • 22 pages • 2023
-
Available in package deal
-
- $11.99
- + learn more
What is the only secure system? 
 
A system that is new. 
A system that has been recently patched. 
A system that has been in production for many years. 
A system that is shut off and disconnected from all networks. -ANSWER A system that is shut off and disconnected from all networks. 
 
Which Principle is not a part of the CIA triad? 
 
Availability 
Confidentiality 
Accountability 
Integrity -ANSWER Accountability 
 
A malicious actor has breached the firewall with a reverse shell. Which side ...
Fear of missing out? Then don’t!
-
WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+
- Exam (elaborations) • 25 pages • 2024
- Available in package deal
-
- $7.99
- + learn more
The Fabrication attack type most commonly affects which principle(s) of the CIA triad? 
A. Availability 
B. Integrity 
C. Confidentiality 
D. Integrity and Availability 
E. Confidentiality and Integrity - CORRECT ANSWER-Integrity and Availability 
The Interception attack type most commonly affects which principle(s) of the CIA triad? 
This task contains the radio buttons and checkboxes for options. The shortcut keys to 
perform this task are A to H and alt+1 to alt+9. 
A.Integrity and Availabili...
-
WGU C838 Managing Cloud Security: Exam Questions and Answers Latest Update 2024/2025 Graded A+.
- Exam (elaborations) • 94 pages • 2024
-
Available in package deal
-
- $13.99
- + learn more
WGU C838 Managing Cloud Security: Exam Questions and Answers Latest Update 2024/2025 Graded A+. What are the 4 characteristics of cloud computing? - correct answers 
 Broad network access 
On-demand services 
Resource Pooling 
Measured or "metered" service 
What NIST publication number defines cloud computing? - correct answers 
800-145 
What ISO/IEC standard provides information on cloud computing? - correct 
answers 17788 
What is another way of describing a functional business requirement? ...
-
WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW (2024) || Questions & Answers (Graded A+)
- Exam (elaborations) • 21 pages • 2024
-
Available in package deal
-
- $12.99
- + learn more
WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW (2024) || Questions & Answers (Graded A+) 
WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW (2024) || Questions & Answers (Graded A+) 
 
The Fabrication attack type most commonly affects which principle(s) of the CIA triad? 
 
A. Availability 
B. Integrity 
C. Confidentiality 
D. Integrity and Availability 
E. Confidentiality and Integrity - ANSWER - Integrity and Availability 
 
The Interception attack type most commonly affects which principle(s) of...
-
WGU D430 Fundamentals of Information Security Questions and Answers.
- Exam (elaborations) • 10 pages • 2024
-
- $11.99
- + learn more
WGU D430 Fundamentals of Information Security Questions and Answers. 
Define the confidentiality in the CIA triad. - correct answer Our ability to protect data from those who 
are not authorized to view it. 
Examples of confidentiality - correct answer A patron using an ATM card wants to keep their PIN 
number confidential. 
An ATM owner wants to keep bank account numbers confidential. 
How can confidentiality be broken? - correct answer Losing a laptop 
An attacker gets access to info 
A person...
-
WGU D430 Fundamentals of Information Security Questions and Answers.
- Exam (elaborations) • 10 pages • 2024
-
- $11.99
- + learn more
WGU D430 Fundamentals of Information Security Questions and Answers. 
Define the confidentiality in the CIA triad. - correct answer Our ability to protect data from those who 
are not authorized to view it. 
Examples of confidentiality - correct answer A patron using an ATM card wants to keep their PIN 
number confidential. 
An ATM owner wants to keep bank account numbers confidential. 
How can confidentiality be broken? - correct answer Losing a laptop 
An attacker gets access to info 
A person...
Do you wonder why so many students wear nice clothes, have money to spare and enjoy tons of free time? Well, they sell on Stuvia! Imagine your study notes being downloaded a dozen times for $15 each. Every. Single. Day. Discover all about earning on Stuvia