2025/2026 with Questions and Verified Rationalized Answers
100% Pass Score
1. Define the confidentiality in the CIA triad.: Our ability to protect data from thosewho are no
z z z z z z z z z z z z z z z z
t authorized to view it.
z z z z
2. Examples of confidentiality: A patron using an ATM card wants to keep theirPIN numbe
z z z z z z z z z z z z z z
r confidential.
z
An ATM owner wants to keep bank account numbers confidential.
z z z z z z z z z
3. How can confidentiality be broken?: Losing a laptopAn atta
z z z z z z z z z
cker gets access to info
z z z z
A person can look over your shoulder
z z z z z z
4. Define integrity in the CIA triad.: The ability to prevent people from changingyour data a
z z z z z z z z z z z z z z z
nd the ability to reverse unwanted changes.
z z z z z z
5. How do you control integrity?: Permissions restrict what users can do (read,write, etc.)
z z z z z z z z z z z z z
6. Examples of integrity: Data used by a doctor to make medical decisions needsto be corre
z z z z z z z z z z z z z z z
ct or the patient can die.
z z z z z
7. Define the availability in the CIA triad.: Our data needs to be accessible whenwe need it.
z z z z z z z z z z z z z z z z
8. How can availability be broken?: Loss of power, application problems.If causedby an attac
z z z z z z z z z z z z z z
ker, this is a Denial of Service attack.
z z z z z z z
9. Define information security.: The protection of information and informationsystems
z z z z z z z z z z
from unauthorized access, use, disclosure, disruption, modification, ordestruction in ord
z z z z z z z z z z
exad includes z
1/6
udes posses- z z
z
, er to provide confidentiality, integrity, and availability.
z z z z z z
10. Define the Parkerian Hexad and its principles.: The Parkerian Hconfidenti
z z z z z z z z z z
ality, integrity, and availability from the CIA triad. It also inclsion (or control), au
z z z z z z z z z z z z z z
thenticity, and utility. z z
11. Authenticity: Whether the data in question comes from who or where it says itcomes fro
z z z z z z z z z z z z z z z
m (i.e. did this person actually send this email?)
z z z z z z z z
12. Confidentiality is affected by what type of attack?: Interception (eaves drop-ping) z z z z z z z z z z z
13. Integrity is affected by what type of attacks?: Interruption (assets are unus-
z z z z z z z z z z z
able), modification (tampering with an asset), fabrication (generating false data)
z z z z z z z z z z
14. Authenticity is affected by what type of attacks?: Interruption (assets are unusable), m
z z z z z z z z z z z z
odification (tampering with an asset), fabrication (generating false data)
z z z z z z z z
15. Utility: How useful the data is to you (can be a spectrum, not just yes or no)
z z z z z z z z z z z z z z z z
16. Possession: Do you physically have the data in question? Used to describe thescope of a l
z z z z z z z z z z z z z z z z
oss
17. Identify the four types of attacks: interception, interruption, modification, andfabricatio
z z z z z z z z z z
n
18. Interception attacks: Make your assets unusable or unavailable z z z z z z z
2z/z6