CMIT 425 | 2025 Update|COMPLETE MOST-
TESTED QUESTIONS AND VERIFIED ANSWERS
(100% Correct answers)|GET IT 100% ACCURATE!!
Save
Terms in this set (50)
A ___________ is a potential threat, threat agent
danger which occurs
when a ___________ exploits a
vulnerability.
Which of the following is protects or assures the accuracy and reliability of
NOT a category of control information and systems.
types?
Integrity is the principle
that _________________.
An exposure occurs when creates the possibility of incurring a loss or
a vulnerability _____________. experiencing harm.
Software digital signing to verify recipients.
Confidentiality can be
protected by
implementing which of the Data hiding and data obscuring techniques.
following controls?
Encrypting data at rest and in transit.
Clustering and load map to the Availability component of the AIC triad.
balancing are controls
that ________
https://quizlet.com/1087140036/cmit-425-2025-updatecomplete-most-tested-questions-and-verified-answers-100-correct-answersget-it-100-accurate-fl… 1/9
, 10/4/25, 7:23 AM CMIT 425 | 2025 Update|COMPLETE MOST-TESTED QUESTIONS AND VERIFIED ANSWERS (100% Correct answers)|GET IT 1…
weighing choices in controls against the magnitude of
risk presented by a variety of threats.
Balanced security refers to
addressing threats and implementing controls for
_____________
availability, integrity, and confidentiality.
understanding the concepts of the AIC triad.
A group of standards, regulations, and best-practices.
Which of the following An organization within an enterprise that houses
best describes a security business activities related to providing security.
program?
A framework made up of many entities that work
together to provide protection for an organization.
Which of the following is Supply Chain Risk Management
used to reduce the risk of
vulnerabilities in
purchased or acquired
hardware and software
products?
Hashing is a control that maps to the Integrity component of the AIC triad.
_______
Which category of control Administrative
types is referred to as "soft
controls?"
Risk can be reduced by applying countermeasures to eliminate vulnerabilities.
_____________.
https://quizlet.com/1087140036/cmit-425-2025-updatecomplete-most-tested-questions-and-verified-answers-100-correct-answersget-it-100-accurate-fl… 2/9