D430questions and answers 2026\2027
CIA Triad
- correct answer Confidential - allowing only those authorized to access the data
requested Integrity - keeping data unaltered in an unauthorized manner and
reliable
Availability - the ability for those authorized to access data when needed
Parkerian Hexad
- correct answer Confidentiality Integrity Availability
Possession - physical deposition of the media on which the data is stored
Authenticity - allows us to talk about the proper attribution as to the owner or creator of the
data in question
Utility - how useful the data is to us
Attack Types
- correct answer
Interception Interruption
Modification
Fabrication
Interception
- correct answer an attacker has access to data , applications or environment
Interruption
- correct answer attacks cause our assets to become unusable or unavailable
Modification
- correct answer attacks involve tampering with our asset
,Fabrication
- correct answer attacks that create false information
Threat
- correct answer something that has potential to cause harm
Vulnerability
- correct answer weaknesses that can be used to harm us
Something you know
- correct answer username , password , PIN
Something you have
- correct answer ID badge , swipe card , OTP
Something you are
- correct answer fingerprint, Iris Retina scan
Somewhere you are
- correct answer geolocation
Something you do
- correct answer handwriting , typing , walking
Authentication
- correct answer verifying that a person is who they claim to be
Mutual authentication
- correct answer Both parties in a transaction to authenticate each other
- Has digital certificates
- Prevents man in the middle attacks
, - The man in the middle is where the attacker inserts themselves into the traffic flow
- Ex . Both the PC and server authenticate each other before data is sent in either direction
Risk management process
- correct answer 1. Identify Asset - identifying and categorizing assets that we're protecting
2. Identify Threats - identify threats
3. Assess Vulnerabilities - look for impacts
4. Assess Risk - asses the risk overall
5. Mitigate Risk - ensure that a given type of threat is accounted for
Incident response process
- correct answer Preparation Detection and
Analysis Identification
Containment
Eradication
Recovery Post -
incident activity
Preparation
- correct answer the activities that we can perform , in advance of the incident itself in order to
better enable us to handle it .
Detection and Analysis (Identification)
- correct answer detect the occurrence of an issue and decide whether or not it is actually an
incident so that we can respond appropriately to it .
Containment
- correct answer involves taking steps to ensure that the situation does not cause any more
damage than it already has , or to at least lessen any ongoing harm
Eradication
- correct answer attempt to remove the effects of the issue from our environment