What is the cia triad - Study guides, Class notes & Summaries
Looking for the best study guides, study notes and summaries about What is the cia triad? On this page you'll find 696 study documents about What is the cia triad.
All 696 results
Sort by
-
CompTIA Network+ Study Guide: Exam N10-009 (Sybex Study Guide) 6th Edition 2024 with complete solution
- Exam (elaborations) • 2011 pages • 2024
-
- $30.49
- 3x sold
- + learn more
CompTIA Network+ Study Guide: Exam N10-009 (Sybex Study Guide) 6th Edition 2024 with complete solution 
 
Table of Contents 
1. Cover 
2. Table of Contents 
3. Title Page 
4. Copyright 
5. Acknowledgments 
6. About the Authors 
7. About the Technical Editor 
8. Table of Exercises 
9. Introduction 
1. What Is the Network+ Certification? 
2. Why Become Network+ Certified? 
3. How to Become Network+ Certified 
4. Tips for Taking the Network+ Exam 
5. Who Should Read This Book? 
6. What Does This Bo...
-
WGU D430 Fundamentals of Information Security Questions and Answers (RATED A)
- Exam (elaborations) • 7 pages • 2023 Popular
- Available in package deal
-
- $11.49
- 1x sold
- + learn more
Define the confidentiality in the CIA triad. - ANSWER-Our ability to protect data from those who are not authorized to view it. 
 
Examples of confidentiality - ANSWER-A patron using an ATM card wants to keep their PIN number confidential. 
An ATM owner wants to keep bank account numbers confidential. 
 
How can confidentiality be broken? - ANSWER-Losing a laptop 
An attacker gets access to info 
A person can look over your shoulder 
 
Define integrity in the CIA triad. - ANSWER-The ability to ...
-
WGU C172 Objective Assessment Exam (New 2023/ 2024 Update) Network and Security Foundations| Questions and Verified Answers| 100% Correct |Graded A
- Exam (elaborations) • 16 pages • 2024
-
Available in package deal
-
- $10.99
- 1x sold
- + learn more
WGU C172 Objective Assessment Exam 
(New 2023/ 2024 Update) Network and 
Security Foundations| Questions and Verified 
Answers| 100% Correct |Graded A 
 
QUESTION 
 What type of exploit is occurring when an attacker attempts to hide their identity while 
communicating on a network? 
 
 
Answer: 
 Spoofing 
 
 
 
QUESTION 
 When an attacker is inserting text that is too large to fit within a region of memory, what type of 
attack are they trying to perform? 
 
 
Answer: 
 Buffer overflow 
 
...
-
WGU C838 FINAL EXAM TEST BANK 400 QUESTIONS AND ANSWERS LATEST 2023- 2024 MANAGING CLOUD SECURITY COMPLETE TEST BANK | A+GRADE.
- Exam (elaborations) • 47 pages • 2023
- Available in package deal
-
- $12.99
- 2x sold
- + learn more
WGU C838 FINAL EXAM TEST BANK 400 QUESTIONS AND ANSWERS LATEST 2023- 2024 MANAGING CLOUD SECURITY COMPLETE TEST BANK |A +GRADE. 
What NIST publication number defines cloud computing? - ANSWER800-145 
What ISO/IEC standard provides information on cloud computing? - 
ANSWER- 17788 
What is cloud bursting? - ANSWER- Ability to increase available cloud 
resources on demand 
What are 3 characteristics of cloud computing? - ANSWER- Elasticity 
Simplicity 
Scalability 
What is a cloud customer? - ANSWE...
-
Wgu Fundamentals of Information Security Exam Questions And Verified Answers 2024.
- Exam (elaborations) • 27 pages • 2024
-
Available in package deal
-
- $9.99
- 1x sold
- + learn more
Controls that protect the systems, networks, and environments that process, transmit, and store our data are called _______. - Answer Logical Controls 
 
During what phase of the incident response process do we determine what happened, why it happened, and what we can do to keep it from happening again? - Answer Post-Incident Activity 
 
Something that has the potential to cause harm to our assets is known as a(n) ________. - Answer Threat 
 
What is the first and arguably one of the...
Fear of missing out? Then don’t!
-
GSEC 401.2 Defense-In-Depth Exam QUESTIONS AND EXPERT REVISED ANSWERS >> ALREADY PASSED
- Exam (elaborations) • 11 pages • 2024
-
- $12.39
- 1x sold
- + learn more
GSEC 401.2 Defense-In-Depth Exam QUESTIONS AND EXPERT REVISED ANSWERS >> ALREADY PASSED 
 
 
What are 5 layers of Defense-in-depth security? - Answer -Perimeter 
Network 
Host 
Application 
Data 
 
What is risk? - Answer -Risk is the probability of a threat crossing or touching a vulnerability 
 
Formula for risk - Answer -Threats x Vulnerabilities = Risk 
 
CIA triad - Answer -Confidentiality, Integrity, Availability 
 
What is the foundation of defense-in-depth? - Answer -filtering 
 
Na...
-
Ethics Review D333 WGU |212 questions with correct answers.
- Exam (elaborations) • 45 pages • 2023
- Available in package deal
-
- $15.49
- 1x sold
- + learn more
Malware that stops you from using your computer until you meet certain demands is categorized as: 
Ransomware 
 
 
 
Flooding a target website with automated requests for data in order to reduce its usefulness for legitimate users is called: 
DDoS attack 
 
 
 
Using fraudulent emails in order to trick people into revealing personal information (e.g. passwords, SSNs, or bank account numbers) is called: 
Phishing 
 
 
 
Malware that poses as a harmless program but that, when installed, exposes on...
-
WGU Course C836 - Fundamentals of Information Security Questions and Answers Already Passed
- Exam (elaborations) • 34 pages • 2022
-
Available in package deal
-
- $20.99
- 9x sold
- + learn more
Which cybersecurity term is defined as the potential for an attack on a resource? 
 
A Impact 
B Vulnerability 
C Risk 
D Threat 
D 
 
 
Which security type deliberately exposes a system's vulnerabilities or resources to an attacker? 
 
A Intrusion detection 
B Firewalls 
C Honeypots 
D Intrusion prevention 
C 
 
 
Which tool can be used to map devices on a network, along with their operating system types and versions? 
 
A Packet sniffer 
B Packet filter 
C Port scanner 
D Stateful firewall 
C...
-
WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW QUESTIONS AND ANSWERS ALREADY PASSED
- Exam (elaborations) • 30 pages • 2022
- Available in package deal
-
- $9.99
- 6x sold
- + learn more
WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW QUESTIONS AND ANSWERS ALREADY PASSED 
The Fabrication attack type most commonly affects which principle(s) of the CIA triad? 
A. Availability 
B. Integrity 
C. Confidentiality 
D. Integrity and Availability E. Confidentiality and Integrity Integrity and Availability 
The Interception attack type most commonly affects which principle(s) of the CIA triad? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform thi...
-
ARDMS (RVT) Ultrasound Vascular Registry Review Questions with 100% Correct answers
- Exam (elaborations) • 27 pages • 2023
- Available in package deal
-
- $13.99
- 7x sold
- + learn more
ARDMS (RVT) Ultrasound Vascular Registry Review Questions with 100% Correct answers 
 
Ultrasound Vascular Registry Review Questions with 100% 
Correct answers 
What is the first branch of the aortic arch? 
Innominate artery/ Brachiocephalic 
Name the three branches of the aortic arch? 
a. Innominate artery/ Brachiocephalic 
b. Lt CCA 
c. Lt Subclavian artery 
The radial artery runs on what side of the forearm? 
Lateral side 
The radial artery branches to form what part of the palmar arch? 
Supe...
Do you wonder why so many students wear nice clothes, have money to spare and enjoy tons of free time? Well, they sell on Stuvia! Imagine your study notes being downloaded a dozen times for $15 each. Every. Single. Day. Discover all about earning on Stuvia