|\ |\ |\ |\
EXAM REVIEW QUESTIONS WITH |\ |\ |\ |\
ANSWERS
The Fabrication attack type most commonly affects which principle(s) of the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
CIA triad?|\
A. Availability
|\
B. Integrity
|\
C. Confidentiality
|\
D. Integrity and Availability
|\ |\ |\
E. Confidentiality and Integrity - CORRECT ANSWERS ✔✔Integrity and
|\ |\ |\ |\ |\ |\ |\ |\ |\
Availability
The Interception attack type most commonly affects which principle(s) of the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
CIA triad? This task contains the radio buttons and checkboxes for options.
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
The shortcut keys to perform this task are A to H and alt+1 to alt+9.
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
A.Integrity and Availability
|\ |\
B.Confidentiality and Integrity |\ |\
C.Availability
D.Integrity
E.Confidentiality - CORRECT ANSWERS ✔✔Confidentiality |\ |\ |\ |\
,Something that has the potential to cause harm to our assets is known as
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
a(n) ________.
|\
A.Threat
B.Impact
C.Risk
D.Vulnerability - CORRECT ANSWERS ✔✔Threat |\ |\ |\ |\
Controls that protect the systems, networks, and environments that process,
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
transmit, and store our data are called _______.
|\ |\ |\ |\ |\ |\ |\
A.Logical controls |\
B.Administrative controls |\
C.Physical controls - CORRECT ANSWERS ✔✔Logical Control
|\ |\ |\ |\ |\ |\
What is the first and arguably one of the most important steps of the risk
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
management process? |\
A.Assess risks |\
B.Mitigate risks |\
C.Identify threats |\
D.Assess vulnerabilities
|\
E.Identify assets - CORRECT ANSWERS ✔✔Identify assets
|\ |\ |\ |\ |\ |\
,Protects information and information systems from unauthorized access, use,
|\ |\ |\ |\ |\ |\ |\ |\
disclosure, disruption, modification, or destruction - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\
✔✔information security |\
A type of attack, primarily against confidentiality - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
✔✔Interception
Something that has the potential to cause harm to our assets - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔Threat |\
A weakness that can be used to harm us - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
✔✔Vulnerability
The likelihood that something bad will happen - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
✔✔Risk
An attack that involves tampering with our assets - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
✔✔Modification attack |\
A model that adds three more principles to the CIA triad: possession or
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
control, utility, and authenticity - CORRECT ANSWERS ✔✔Parkerian hexad
|\ |\ |\ |\ |\ |\ |\ |\
The physical disposition of the media on which the data is stored -
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
CORRECT ANSWERS ✔✔Possession or control |\ |\ |\ |\
, An attack that involves generating data, processes, communications, or other
|\ |\ |\ |\ |\ |\ |\ |\ |\
similar activities with a system - CORRECT ANSWERS ✔✔Fabrication
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
attack
A multilayered defense that will allow us to achieve a successful defense
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
should one or more of our defensive measures fail - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
✔✔Defense in depth |\ |\
Sometimes called technical controls, these protect the systems, networks, and
|\ |\ |\ |\ |\ |\ |\ |\ |\
environments that process, transmit, and store our data - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔Logical controls |\ |\
Controls that protect the physical environment in which our systems sit, or
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
where our data is stored - CORRECT ANSWERS ✔✔Physical controls
|\ |\ |\ |\ |\ |\ |\ |\ |\
The risk management phase that consists of all of the activities that we can
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
perform in advance of the incident itself, in order to better enable us to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
handle it - CORRECT ANSWERS ✔✔Preparation phase
|\ |\ |\ |\ |\ |\
The risk management phase where we detect the occurrence of an issue and
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
decide whether it is actually an incident so that we can respond to it
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
appropriately - CORRECT ANSWERS ✔✔Detection and analysis phase |\ |\ |\ |\ |\ |\ |\
The biometric characteristic that measures how well a factor resists change
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
over time and with advancing age is called __________.
|\ |\ |\ |\ |\ |\ |\ |\