UPDATED Questions and CORRECT
Answers
CIA Triad - CORRECT ANSWER - Confidentiality, Integrity and Availability
Confidentiality - CORRECT ANSWER - Making sure only approved users have access to
data
Integrity - CORRECT ANSWER - Data Integrity and Source Integrity
Availability - CORRECT ANSWER - Ensuring data is accessible by approved users when
needed
Data Integrity - CORRECT ANSWER - Assurance that information has not been tampered
with or corrupted between the source and the end user
Source Integrity - CORRECT ANSWER - Assurance that the sender of the information is
who it is supposed to be
PPT - CORRECT ANSWER - People, Processes and Technology is a holistic approach to
securing an organization's information
Confidentiality Methods/Tools - CORRECT ANSWER - Encryption and User access
control
Integrity Methods/Tools - CORRECT ANSWER - Encryption ‐ User access control ‐ File
permissions ‐ Version control systems/backups