OF
INFORMATION
SECURITY
[Document subtitle]
, Fundamentals of Information Security
Which type of system is considered absolutely secure?
A. A system that is new.
B. A system that has been recently patched.
C. A system that has been in production for many years.
D. A system that is shut off and disconnected from all networks. - answer-D. A system that is shut off and
disconnected from all networks.
Which concept of the CIA Triad is associated with reliability?
A. Availability
B. Confidentiality
C. Authentication
D. Integrity - answer-D. Integrity (it ensures data has not been tampered with & its correct, authentic, &
reliable.
A malicious actor has breached the firewall with a reverse shell. Which side of the CIA triad is most
affected?
A. Availability
B. Confidentially
C. Authentication
D. Integrity - answer-B. Confidentiality
A user changes a number in a dataset with a typo. Which side of the CIA Triad is most affected?
A. Availability
B. Confidentiality
C. Authentication
D. Integrity - answer-D. Integrity
What is an example of identification?
A. Fingerprint
B. Mothers Maiden Name
C. Captcha Tests
D. Username - answer-D. Username
What are 3 forms of authentication?
A. Four-digit PIN number
B. Text of 6-digit number to phone
C. Phone number
D. Fingerprint
E. Account Number