SECURITY EXAM SCRIPT 2026 FULL
QUESTIONS AND CORRECT ANSWERS
◉ Define integrity in the CIA triad. Answer: The ability to prevent
people from changing your data and the ability to reverse unwanted
changes. (Access control, read and write permissions, info correct)
◉ Define the availability in the CIA triad. Answer: Our data needs to be
accessible when we need it.(because of power loss and such)
◉ Define information security. Answer: The protection of information
and information systems from unauthorized access, use, disclosure,
disruption, modification, or destruction in order to provide
confidentiality, integrity, and availability.
◉ Define the Parkerian Hexad and its principles. Answer: The Parkerian
Hexad includes confidentiality, integrity, and availability from the CIA
triad. It also includes possession (or control), authenticity, and utility.
◉ Authenticity. Answer: Whether the data in question comes from who
or where it says it comes from (i.e. did this person actually send this
email?)
,◉ Confidentiality is affected by what type of attack? Answer:
Interception (eaves dropping)
◉ Integrity is affected by what type of attacks? Answer: Interruption
(assets are unusable), modification (tampering with an asset), fabrication
(generating false data)
◉ Authenticity is affected by what type of attacks? Answer: Interruption
(assets are unusable), modification (tampering with an asset), fabrication
(generating false data)
◉ Utility. Answer: How useful the data is to you (can be a spectrum, not
just yes or no)
◉ Possession. Answer: Do you physically have the data in question?
Used to describe the scope of a loss
◉ Identify the four types of attacks. Answer: interception, interruption,
modification, and fabrication
◉ Interception attacks. Answer: Make your assets unusable or
unavailable
◉ Interruption attacks. Answer: cause assets to become unusable or
unavailable for our use, on a temporary or permanent basis
, ◉ Modification attacks. Answer: Tampering with an asset
◉ Fabrication attacks. Answer: Generating data, process, and
communications
◉ Define the risk management process(car). Answer: 1. Identify assets
2. Identify threats
3. Assess vulnerabilities
4. Assess risks
5. Mitigate risks
◉ Define the incident response process and its stages.(zombie). Answer:
Preparation
Detection and analysis
Containment
Eradication
Recovery
◉ Preparation in incident response. Answer: creating policies and
procedures