OPERATIONS QUESTIONS WITH
CORRECT
DETAILED ANSWERS || ALREADY
GRADED A+ < LATEST VERSION >
1. Define the confidentiality in the cia triad. - answer 🗸 our ability to
protect data from those who are not authorized to view it.
2. Examples of confidentiality - answer 🗸 a patron using an atm card
wants to keep their pin number confidential.
a. An atm owner wants to keep bank account numbers
confidential.
3. How can confidentiality be broken? - answer 🗸 losing a laptop
a. An attacker gets access to info
b. A person can look over your shoulder
4. Define integrity in the cia triad. - answer 🗸 the ability to prevent
people from changing your data and the ability to reverse
unwanted changes.
, 5. Utility - answer 🗸 how useful the data is to you (can be a
spectrum, not just yes or no)
6. Possession - answer 🗸 do you physically have the data in
question? Used to describe the scope of a loss
7. Identify the four types of attacks - answer 🗸 interception,
interruption, modification, and fabrication
8. Interception attacks - answer 🗸 make your assets unusable or
unavailable
9. Interruption attacks - answer 🗸 cause assets to become unusable or
unavailable for our use, on a temporary or permanent basis
10. Modification attacks - answer 🗸 tampering with an asset
11. Fabrication attacks - answer 🗸 generating data, process, and
communications
12. Define the risk management process - answer 🗸 1. Identify
assets
a. 2. Identify threats
b. 3. Assess vulnerabilities