Chapter 1 Review Flashcards
In information security, what are the three main goals? (Select the three best answers.)
A. Auditing B. Integrity C. Non-Repudiation D. Confidentiality E. Risk Assessment F. Availability
Availability, Integrity and Confidentiality
Tom sends out many e-mails containing secure information to other companies. What concept should be implemented to prove that Tom did indeed send the e-mails?
A. Authenticity
B. Non-Repudiation
C. Confidentiality
D. Integrity
B. Non-Repudiation
A user receives an e-mail but the e-mail client software says that the digital signature is invalid and the sender of the e-mail cannot be verified. The would-be recipient is concerned about which of the following concepts?
A. Confidentiality
B. Integrity
C. Remediation
D. Availability
B. Integrity
Cloud environments often reuse the same physical hardware (such as hard drives) for multiple customers. These hard drives are used and reused when customer virtual machines are created and deleted over time. What security concern does this bring up implications for?
A. Availability of virtual machines
B. Integrity of data
C. Data confidentiality
D. Hardware integrity
C. Data confidentiality