QUESTIONS WITH SOLUTIONS GRADED A+
◍ Confidentiality. Answer: Data or information not disclosed to
unauthorized persons or processes
◍ Configuration Management. Answer: Process to ensure authorized
and validated changes to a system
◍ Crime Prevention through Environmental Design (CPTED).
Answer: Architectural approach to reduce criminal activity
◍ Criticality. Answer: Measure of dependence on information or
system for mission or business success
◍ Cryptanalyst. Answer: One who performs cryptanalysis to defeat
cryptographic techniques and security systems
◍ Cryptography. Answer: Methods to secure messages and
information through disguise or transformation
◍ Data Integrity. Answer: Property of data not being altered in an
unauthorized manner
, ◍ Data Loss Prevention (DLP). Answer: System capabilities to detect
and prevent unauthorized use and transmission of information
◍ Decryption. Answer: Process of converting ciphertext back into
plaintext using the appropriate key
◍ De-encapsulation. Answer: Process of unpacking or revealing
bundled data
◍ Defense in Depth. Answer: Information security strategy with
multiple layers of controls
◍ Degaussing. Answer: Technique to erase data on disk or tape by
removing magnetic remanence
◍ Denial of Service (DoS). Answer: Prevention of authorized access
or time-critical operations
◍ Digital Signature. Answer: Transformation of data providing origin
authentication, data integrity, and non-repudiation
◍ Disaster Recovery (DR). Answer: Activities to restore IT and
communications services during and after an outage
◍ Disaster Recovery Plan (DRP). Answer: Instructions for recovering
critical business functions after a disruption