|/ |/
FINAL EXAM REVIEW QUESTIONS
|/ |/ |/ |/
WITH ANSWERS
|/ |/
The Fabrication attack type most commonly affects which
|/ |/ |/ |/ |/ |/ |/
principle(s) of the CIA triad?
|/ |/ |/ |/ |/
A. Availability
|/
B. Integrity
|/
C. Confidentiality
|/
D. Integrity and Availability
|/ |/ |/
E. Confidentiality and Integrity - CORRECT ANSWERS ✔✔Integrity
|/ |/ |/ |/ |/ |/ |/
and Availability
|/ |/
The Interception attack type most commonly affects which
|/ |/ |/ |/ |/ |/ |/
principle(s) of the CIA triad? This task contains the radio buttons
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/
and checkboxes for options. The shortcut keys to perform this
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/
task are A to H and alt+1 to alt+9.
|/ |/ |/ |/ |/ |/ |/ |/ |/
A.Integrity and Availability |/ |/
B.Confidentiality and Integrity |/ |/
C.Availability
D.Integrity
E.Confidentiality - CORRECT ANSWERS ✔✔Confidentiality |/ |/ |/ |/
,Something that has the potential to cause harm to our assets is
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/
known as a(n) ________.
|/ |/ |/ |/
A.Threat
B.Impact
C.Risk
D.Vulnerability - CORRECT ANSWERS ✔✔Threat |/ |/ |/ |/
Controls that protect the systems, networks, and environments
|/ |/ |/ |/ |/ |/ |/
that process, transmit, and store our data are called _______.
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/
A.Logical controls |/
B.Administrative controls |/
C.Physical controls - CORRECT ANSWERS ✔✔Logical Control
|/ |/ |/ |/ |/ |/
What is the first and arguably one of the most important steps of
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/
the risk management process?
|/ |/ |/ |/
A.Assess risks |/
B.Mitigate risks |/
C.Identify threats |/
D.Assess vulnerabilities |/
E.Identify assets - CORRECT ANSWERS ✔✔Identify assets
|/ |/ |/ |/ |/ |/
,Protects information and information systems from unauthorized
|/ |/ |/ |/ |/ |/
access, use, disclosure, disruption, modification, or destruction -
|/ |/ |/ |/ |/ |/ |/ |/
CORRECT ANSWERS ✔✔information security
|/ |/ |/ |/
A type of attack, primarily against confidentiality - CORRECT
|/ |/ |/ |/ |/ |/ |/ |/
ANSWERS ✔✔Interception
|/ |/
Something that has the potential to cause harm to our assets -
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/
CORRECT ANSWERS ✔✔Threat
|/ |/ |/
A weakness that can be used to harm us - CORRECT ANSWERS
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/
✔✔Vulnerability
|/
The likelihood that something bad will happen - CORRECT
|/ |/ |/ |/ |/ |/ |/ |/
ANSWERS ✔✔Risk
|/ |/
An attack that involves tampering with our assets - CORRECT
|/ |/ |/ |/ |/ |/ |/ |/ |/
ANSWERS ✔✔Modification attack
|/ |/ |/
A model that adds three more principles to the CIA triad:
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/
possession or control, utility, and authenticity - CORRECT
|/ |/ |/ |/ |/ |/ |/ |/
ANSWERS ✔✔Parkerian hexad
|/ |/ |/
The physical disposition of the media on which the data is stored
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/
- CORRECT ANSWERS ✔✔Possession or control
|/ |/ |/ |/ |/ |/
, An attack that involves generating data, processes,
|/ |/ |/ |/ |/ |/
communications, or other similar activities with a system -
|/ |/ |/ |/ |/ |/ |/ |/ |/
CORRECT ANSWERS ✔✔Fabrication attack
|/ |/ |/ |/
A multilayered defense that will allow us to achieve a successful
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/
defense should one or more of our defensive measures fail -
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/
CORRECT ANSWERS ✔✔Defense in depth
|/ |/ |/ |/ |/
Sometimes called technical controls, these protect the systems,
|/ |/ |/ |/ |/ |/ |/
networks, and environments that process, transmit, and store
|/ |/ |/ |/ |/ |/ |/ |/
our data - CORRECT ANSWERS ✔✔Logical controls
|/ |/ |/ |/ |/ |/ |/
Controls that protect the physical environment in which our
|/ |/ |/ |/ |/ |/ |/ |/
systems sit, or where our data is stored - CORRECT ANSWERS
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/
✔✔Physical controls
|/ |/
The risk management phase that consists of all of the activities
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/
that we can perform in advance of the incident itself, in order to
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/
better enable us to handle it - CORRECT ANSWERS
|/ |/ |/ |/ |/ |/ |/ |/ |/
✔✔Preparation phase
|/ |/
The risk management phase where we detect the occurrence of
|/ |/ |/ |/ |/ |/ |/ |/ |/
an issue and decide whether it is actually an incident so that we
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/
can respond to it appropriately - CORRECT ANSWERS
|/ |/ |/ |/ |/ |/ |/ |/
✔✔Detection and analysis phase
|/ |/ |/ |/
The biometric characteristic that measures how well a factor
|/ |/ |/ |/ |/ |/ |/ |/
resists change over time and with advancing age is called
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/
__________.
|/