UPDATED ACTUAL Exam Questions and
CORRECT Answers
Symmetric encryption - CORRECT ANSWER - Used to conceal the contents of blocks or
stream of data of any size, including messages, files, encryption keys, and passwords
Asymmetric encryption - CORRECT ANSWER - Used to conceal small blocks of data,
such as encryption keys and hash function values, which are used in digital signatures
Data integrity algorithms - CORRECT ANSWER - Used to protect blocks of data from
alteration
Authentication protocols - CORRECT ANSWER - Schemes based on the use of
cryptographic designed to authenticate the identity of entities
The Internet and security field consist of - CORRECT ANSWER - Measures to deter,
prevent, detect, and correct security violations that involve the transmission of information
NIST - CORRECT ANSWER - National institute of standards and technology
Computer security - CORRECT ANSWER - The protection afforded to an automated
information system in order to attain the applicable objectives of preserving the integrity,
availability and confidentiality of information system resources
Confidentiality types - CORRECT ANSWER - 1- Data confidentiality
2- Privacy
Data confidentiality - CORRECT ANSWER - Assures that private or confidential
information is not made available or disclosed to unauthorized individuals
, Privacy - CORRECT ANSWER - Assures that individuals control or influence what
related to them may be collected and stored and by whom and to whom information may be
disclosed
Integrity - CORRECT ANSWER - 1- data integrity
2- system integrity
Data integrity - CORRECT ANSWER - Assures that information and programs are
changed only in a specified and authorized manner
System integrity - CORRECT ANSWER - Assures that a system performs it's intended
function in unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of
system
Availability - CORRECT ANSWER - Assures that systems work promptly and service is
not denied to authorized users
Authenticity - CORRECT ANSWER - Verifying that users are who they say they are and
that each input arriving at the system came from a trusted source
Accountability - CORRECT ANSWER - The security goal that generate the requirement
for actions of an entity to be traced uniquely to that entity
High level breach - CORRECT ANSWER - The loss could be expected to have severe or
catastrophic adverse effect on organizational operations, organizational assets, or individuals
Moderate level breach - CORRECT ANSWER - The loss could be expected to have
serious adverse effect on organizational operations, organizational assets, or individuals