SECURITY OAEXAM 2 VERSIONS TESTBANK
AND LATEST UPDATED
COMPLETE STUDYGUIDE - 250 QUESTIONS AND CORRECT DETAILED VERIFIED
ANSWERS NEWEST UPDATED VERSION 2025 |ALREADY GRADED A+
Information security - Correct Answer protecting data, software, and hardware secure against
unauthorized access, use, disclosure, disruption, modification, or destruction."
"Compliance - Correct Answer The requirements that are set forth by laws and industry
regulations.
"How to maintain integrity? - Correct Answer Prevent unauthorized changes to the data and
the ability to reverse unwanted authorized changes.
Via system/file permissions or Undo/Roll back undesirable changes."
"Availability - Correct Answer The ability to access data when needed"
"Ways Availability can be compromised - Correct Answer - Power loss
- Application issues
- Network attacks
- System compromised (DoS)"
IE: HIPPA/ HITECH- healthcare, PCI/DSS- payment card industry, FISMA- federal government
agencies"
"DAD Triad - Correct Answer Disclosure, alteration, and denial"
"CIA Triad - Correct Answer The core model of all information security concepts. Confidential,
integrity and availability"
,"Confidential - Correct Answer Ability to protect our data from those who are not authorized
to view it."
"What ways can confidentiality be compromised? - Correct Answer - lose a personal laptop
with data
- Person can view your password you are entering in
- Send an email attachment to the wrong person.
- Attacker can penetrate your systems....etc."
"integrity - Correct Answer Keeping data unaltered by accidental or malicious intent"
"Denial of Service (DoS) - Correct Answer Security problem in which users are not able to
access an information system; can be caused by human errors, natural disaster, or malicious
activity."
"Parkerian hexad model - Correct Answer A model that adds three more principles to the CIA
triad:
Possession/Control
Utility
Authenticity"
"Improper or Inadequate Permissions - Correct Answer Particularly with Web applications
and pages, there are often sensitive files and directories that will cause security issues if
they are exposed to general users. One area that might cause us trouble is the exposure of
configuration files due to improper or inadequate permissions."
"Extraneous files - Correct Answer unnecessary files that aren't cleaned up when the
application moves from development to production. Leaving extraneous files may be handing
attackers materials they need to compromise the system."
"Protocol issues - Correct Answer Vulnerability often involve common software development
issues such as buffer overflows"
"Unauthenticated access - Correct Answer When we give a user or process the opportunity to
interact with our database without supplying a set of credentials."
, "arbitrary code execution - Correct Answer Occurs when an attacker is able to execute or run
commands on a victim computer"
"Privilege Escalation - Correct Answer An attack that exploits a vulnerability in software to
gain access to resources that the user normally would be restricted from accessing."
"Possession/ control - Correct Answer Refers to the physical disposition of the media on
which the data is stored; This allows you to discuss loss of data via its physical medium."
"Principle of Possession example - Correct Answer Lost package (encrypted USB's and
unencrypted USB's)
possession is an issue because the tapes are physically lost.
(Unencrypted is compromised via confidentiality and possession; encrypted is compromised
only via possession)."
"Principle of Authenticity - Correct Answer Allows you to say whether you've attributed the
data in question to the proper owner/creator."
"Ways authenticity can be compromised - Correct Answer Sending an email but altering the
message to look like it came from someone else, than the original one that was sent."
"Utility - Correct Answer How useful the data is to you.
Ex. Unencrypted (a lot of utility) Encrypted (little utility)."
"Security Attacks - Correct Answer Broken down from the type of attack, risk the attack
represents, and controls you might use to mitigate it."
"Types of attacks - Correct Answer 1- interception
2- interruption
3- modification
4- fabrication"