FOUNDATIONS PA AND OA EXAM 2026
COMPREHENSIVE STUDY
◉ Confidentiality. Answer: Making sure only approved users have
access to data
◉ Integrity. Answer: Data Integrity and Source Integrity
◉ Availability. Answer: Ensuring data is accessible by approved
users when needed
◉ Data Integrity. Answer: Assurance that information has not been
tampered with or corrupted between the source and the end user
◉ Source Integrity. Answer: Assurance that the sender of the
information is who it is supposed to be
◉ PPT. Answer: People, Processes and Technology is a holistic
approach to securing an organization's information
◉ Confidentiality Methods/Tools. Answer: Encryption and User
access control
,◉ Integrity Methods/Tools. Answer: Encryption ‐ User access
control ‐ File permissions ‐ Version control systems/backups
◉ Availability Methods/Tools. Answer: Offsite data storage/backups
‐ Redundant architecture (hardware and software)
◉ Encryption. Answer: Passwords, encryption keys
◉ User Access Control (UAC). Answer: Controlling which users have
access to networks and what level of access each user has
◉ File permissions. Answer: Customizable settings that only allow
certain users to view and edit files
◉ Hot Site. Answer: Has all the equipment needed for the enterprise
to continue operation, including office space and furniture,
telephone jacks and computer equipment.
◉ Cold Site. Answer: Is a similar type of disaster recovery service
that provides office space, but the customer provides and installs all
the equipment needed to continue operations, and is less expensive,
but it takes longer to get an enterprise in full operation after the
disaster.
,◉ Warm Site. Answer: Is a compromise between hot and cold. These
sites will have hardware and connectivity already established,
though on a smaller scale than the original production site or even a
hot site. These sites might have backups on hand, but they may not
be complete and may be between several days and a week old. The
recovery will be delayed while backup tapes are delivered to the site,
or network connectivity is established and data is recovered from a
remote backup site
◉ Threat. Answer: An attacker or piece of malware that desires
and/or is able to cause harm to a target
◉ Vulnerability. Answer: Flaw in an environment that an attacker
can use to harm the target
◉ Exploit. Answer: The method by which an attacker can use a
vulnerability
◉ Risk. Answer: The potential that a threat will exploit a
vulnerability
◉ It is a network of users that share computer resources in a limited
area.. Answer: LAN
, ◉ Local Area Network. Answer: LAN
◉ How are Local Area Networks defined?. Answer: In terms of
protocol and the topology used for accessing the network.
◉ A set of rules established for users to exchange information.
Answer: Protocol
◉ The network architecture used to interconnect the networking
equipment.. Answer: Topology
◉ What are the most common topologies for LANs?. Answer: Ring,
Bus, and Star
◉ Uses a token that is placed in the data channel and circulates
around the ring.. Answer: Token Ring topology
◉ A deterministic network. Answer: Token Ring Topology
◉ Each station connected to the network ensures access for
transmission of its messages at regular or fixed time intervals.
Answer: Deterministic