CMIT 425 |2024-2025 Update|COMPLETE
MOST-TESTED QUESTIONS AND VERIFIED
ANSWERS (100% Correct answers)|GET IT 100%
ACCURATE!!
Terms in this set (50)
A ___________ is a potential threat, threat agent
danger which occurs
when a ___________ exploits a
vulnerability.
Which of the following is protects or assures the accuracy and reliability of
NOT a category of information and systems.
control types?
Integrity is the principle
that _________________.
An exposure occurs creates the possibility of incurring a loss or
when a vulnerability experiencing harm.
_____________.
Software digital signing to verify recipients.
Confidentiality can be
protected by
implementing which of Data hiding and data obscuring techniques.
the following controls?
Encrypting data at rest and in transit.
Clustering and load map to the Availability component of the AIC triad.
balancing are controls
that ________
https://quizlet.com/966724306/cmit-425-2024-2025-updatecomplete-most-tested-questions-and-verified-answers-100-correct-answersget-it-100-a… 1/9
, 11/4/24, 11:38 PM CMIT 425 |2024-2025 Update|COMPLETE MOST-TESTED QUESTIONS AND VERIFIED ANSWERS (100% Correct answer…
weighing choices in controls against the magnitude
of risk presented by a variety of threats.
Balanced security refers
addressing threats and implementing controls for
to _____________
availability, integrity, and confidentiality.
understanding the concepts of the AIC triad.
A group of standards, regulations, and best-
practices.
Which of the following
An organization within an enterprise that houses
best describes a security
business activities related to providing security.
program?
A framework made up of many entities that work
together to provide protection for an organization.
Which of the following is Supply Chain Risk Management
used to reduce the risk of
vulnerabilities in
purchased or acquired
hardware and software
products?
Hashing is a control that maps to the Integrity component of the AIC triad.
_______
Which category of Administrative
control types is referred
to as "soft controls?"
Risk can be reduced by applying countermeasures to eliminate
_____________. vulnerabilities.
PCI-DSS is a federal law that protects the privacy of
credit card transactions.
USA Patriot Act broadens privacy protections for
Which of the following
federal law enforcement agents and immigration
statements is true?
authorities.
FISMA applies to federal agencies and their
contractors.
https://quizlet.com/966724306/cmit-425-2024-2025-updatecomplete-most-tested-questions-and-verified-answers-100-correct-answersget-it-100-a… 2/9