2025/2026 Most Recent Actual Complete Real Exam
Questions And Verified Answers | 100% Correct
Answers | Graded A+ Guaranteed Success!!
Newest Exam | Just Released!!
Which term is synonymous with symmetric cryptography? -
ANSWER-Secret
key
cryptography
Which term is synonymous with asymmetric cryptography? -
ANSWER-Public
key
cryptography
Define the confidentiality in the CIA triad. - ANSWER-Our ability
to protect data
from those who are not authorized
to view it.
Examples of confidentiality - ANSWER-A patron using an ATM
card wants to
keep their PIN number
confidential.
An ATM owner wants to keep bank account numbers
confidential.
,How can confidentiality be broken? - ANSWER-
Losing a laptop
An attacker gets access
to info
A person can look over your
shoulder
Define integrity in the CIA triad. - ANSWER-The ability to
prevent people from
changing your data and the ability to reverse
unwanted changes.
How do you control integrity? - ANSWER-Permissions restrict
what users can
do (read, write,
etc.)
Examples of integrity - ANSWER-Data used by a doctor to
make medical
decisions needs to be correct or the
patient can die.
Define the availability in the CIA triad. - ANSWER-Our data
needs to be
accessible when we
need it.
How can availability be broken? - ANSWER-Loss of
power, application
, problems. If caused by an attacker, this is a Denial of
Service attack.
Define information security. - ANSWER-The protection of
information and information systems from unauthorized
access, use, disclosure, disruption, modification, or
destruction in order to provide confidentiality, integrity, and
availability.
Define the Parkerian Hexad and its principles. - ANSWER-The
Parkerian Hexad
includes confidentiality, integrity, and availability from the
CIA triad. It also
includes possession (or control),
authenticity, and utility.
Authenticity - ANSWER-Whether the data in question comes
from who or where
it says it comes from (i.e. did this person actually
send this email?)
Confidentiality is affected by what type of attack? -
ANSWER-Interception
(eaves
dropping)
Integrity is affected by what type of attacks? - ANSWER-
Interruption (assets are unusable), modification (tampering with
an asset), fabrication (generating false data)