(A NEW UPDATED VERSION 2024-2025) COMPLETE ACTUAL
TEST QUESTIONS WITH WELL ELABORATED ANSWERS
(CORRECT VERIFIED SOLUTIONS) |ALREADY GRADED A+
(NEW!)
EXAM PREP
Firewalls
Answer- a mechanism for maintaining control over the traffic
that flows into and out of our networks. (EX: installed for
internal network and the internet)
Information Security
Answer- Protecting an organization's information and
information systems from unauthorized access, use, disclosure,
disruption, modification, or destruction.
Compliance
Answer- Requirements that are set forth by laws and industry
regulations.
,CIA
Answer- Confidentiality, Integrity, Availability
Confidentiality
Answer- protecting data from those who are NOT authorized to
use/view it. (EX: inappropriately accessing and/or sharing
information)
Integrity
Answer- The ability to prevent people from changing your data
in an unauthorized or undesirable manner (EX: to prevent data
from being modified or misused by an unauthorized party)
Availability
,Answer- Refers to the ability to access our data when we need
it (EX: power loss of operating system)
Possession/Control
Answer- refers to the physical disposition of the media on
which the data is stored. (EX: tape examples
Authenticity
Answer- whether you've attributed the data in question to the
proper owner or creator. (EX: altered email that says it's from
one person when it's not)
Utility
Answer- refers to how useful the data is to you.
, Types of Attacks
Answer- Interception, Interruption, Modification, and
Fabrication
Interception
Answer- attacks that ALLOW unauthorized users to access your
data, applications, or environments. primarily attacks against
confidentiality. (EX: reading someone's email)
Interruption
Answer- attacks that make your assets unusable or unavailable
to you temporarily or permanently. affects AVAILBAILTY, but
can affect INTEGRITY. (EX: DoS attack on a mail server)
Modification