CMIT 425 questions and answers with solutions 2025
A ___________ is a potential danger which occurs when a ___________ exploits a vulnerability. - ANSWER threat, threat agent Which of the following is NOT a category of control types? - ANSWER protects or assures the accuracy and reliability of information and systems. Integrity is the principle that _________________. - ANSWER An exposure occurs when a vulnerability _____________. - ANSWER creates the possibility of incurring a loss or experiencing harm. Confidentiality can be protected by implementing which of the following controls? - ANSWER Software digital signing to verify recipients. Data hiding and data obscuring techniques. Encrypting data at rest and in transit. Clustering and load balancing are controls that ________ - ANSWER map to the Availability component of the AIC triad. Balanced security refers to _____________ - ANSWER weighing choices in controls against the magnitude of risk presented by a variety of threats. addressing threats and implementing controls for availability, integrity, and confidentiality. understanding the concepts of the AIC triad. Which of the following best describes a security program? - ANSWER A group of standards, regulations, and best-practices. An organization within an enterprise that houses business activities related to providing security.
Written for
- Institution
- Cmit
- Course
- Cmit
Document information
- Uploaded on
- December 31, 2024
- Number of pages
- 7
- Written in
- 2024/2025
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cmit 425 questions and answers with solutions 2025
Also available in package deal