D315 Questions with 100% Correct
Answers
CIA Triad Correct Answer: Confidentiality, Integrity and Availability
Confidentiality Correct Answer: Making sure only approved users have access
to data
Integrity Correct Answer: Data Integrity and Source Integrity
Availability Correct Answer: Ensuring data is accessible by approved users when
needed
Data Integrity Correct Answer: Assurance that information has not been
tampered with or corrupted between the source and the end user
Source Integrity Correct Answer: Assurance that the sender of the information is
who it is supposed to be
PPT Correct Answer: People, Processes and Technology is a holistic approach to
securing an organization's information
Confidentiality Methods/Tools Correct Answer: Encryption and User access
control
Integrity Methods/Tools Correct Answer: Encryption ‐ User access control ‐ File
permissions ‐ Version control systems/backups
Availability Methods/Tools Correct Answer: Offsite data storage/backups ‐
Redundant architecture (hardware and software)