Overview UPDATED Exam Questions and
CORRECT Answers
Data - CORRECT ANSWER - Unorganized facts that can be processed into meaningful
information.
Information - CORRECT ANSWER - Processed data conveying specific meaning, & of
substantial value.
Personal Data - CORRECT ANSWER - Minor personal details that can lead to
susceptibility to financial, emotional & physical damage.
Organizational Data - CORRECT ANSWER - Information belonging to commercial
entities.
Commercial Data Breach - CORRECT ANSWER - Impacts include financial value,
market value, credibility, time loss, and costs.
Natural Threats - CORRECT ANSWER - Natural disasters / accidents that cannot be
predicted or avoided.
User Error - CORRECT ANSWER - The biggest threat to data, often due to ignorance or
accidental lapses.
Data Predators - CORRECT ANSWER - Individuals or entities that seek to exploit
personal information of value in the digital age.
Data Security - CORRECT ANSWER - The process of protecting information, & the
infrastructure storing it, from unauthorized access / misuse.
,Malicious Programs - CORRECT ANSWER - Viruses, worms, & spyware that infect 90%
of the devices that users connect to the Internet.
Zombies - CORRECT ANSWER - Compromised computers used to launch attacks.
Physical Security - CORRECT ANSWER - Protection against loss or theft of media such
as laptops, data cards, and phones.
Data Loss - CORRECT ANSWER - Potential losses that can occur due to a data
compromise.
Backup - CORRECT ANSWER - A solution for data loss that involves storing important
items in a remote location.
Corporate Espionage - CORRECT ANSWER - Data thefts that target weak links in cyber
security chains.
Social Engineering - CORRECT ANSWER - A common method of attackers that involves
befriending individuals to gain access to data.
Awareness - CORRECT ANSWER - Recommended practice to mitigate threats to data
from oneself and others.
CIA Triad - CORRECT ANSWER - Refers to the principles of confidentiality, integrity,
and availability in data security.
Data Security Threats - CORRECT ANSWER - Includes natural threats, user error, and
threats from others.
,Data Generation - CORRECT ANSWER - The process by which data is constantly
created, including phone numbers, map locations, and transactions.
Preparedness - CORRECT ANSWER - The act of preparing and preventing data loss
through regular scheduling and backup.
Legal Fees & Lawsuits - CORRECT ANSWER - Costs associated with data breaches that
can impact organizations.
Remote Work Security - CORRECT ANSWER - Measures taken to secure data and
communications while working remotely.
Confidentiality of Data - CORRECT ANSWER - Concept of being known / accessible to
ONLY Authorized Users.
Integrity - CORRECT ANSWER - Security of Data. FUNCTION: ensuring info is
accurate, complete, reliable, & is in its original form.
Authenticity - CORRECT ANSWER - The truthfulness of the Origin of Data.
FUNCTION: ensures claimed source of Data is actually original source and not tampered with
since creation.
Availability of Data - CORRECT ANSWER - Authorized user access at any point of time.
FUNCTION: ensures once a user captures the Data, it must make it available when they request
it.
Nonrepudiation - CORRECT ANSWER - Process ensuring the accuracy of the Sender &
Receiver of a message. FUNCTION: ensures sender cannot deny having sent the message & the
recipient cannot deny having received it.
Financial Loss - CORRECT ANSWER - Systems Unavailable - COSTLY (enterprise =
Sensitive Data / Home = Bank/Credit card info).
, Depleted Resources - CORRECT ANSWER - Drive space/memory/processor speed -
PERFORMANCE latency.
Identity Theft - CORRECT ANSWER - Process of stealing personal info w/ intent to use
illegally.
Identity Fraud - CORRECT ANSWER - Actual usage of stolen PII in illegal activities.
Loss of Trust - CORRECT ANSWER - Breach disguised as Trusted Entity - MALICIOUS
SOFTWARE.
Data Loss / Theft - CORRECT ANSWER - Public release - Organization / Individual
damage (REPUTATION).
Misuse of Computer Resources - CORRECT ANSWER - Higher performance & Faster
Internet = Reduced Security.
Precaution - CORRECT ANSWER - Action taken in advanced to protect the system
against Threats / Dangers.
Precautionary Measures - CORRECT ANSWER - Installing & maintaining Antivirus
program, Firewall program, Strong Passwords, File/App DLs from ONLY Known & Trusted
Sources, Virus Scans regularly, System Updates regularly.
Maintenance - CORRECT ANSWER - Actions supporting precautionary measures &
securing devices. FUNCTION: check the efficacy of the precautionary measures & Update when
required.