CIA Flashcards
The Information Security Triad comprises these three components:
a) Firmware, Firewall, Anti-virus b) Confidentiality, Integrity, Availability c) Firewall, Anti-virus, Biometrics d) Confidentiality, Integrity, Anonymity (CIA)
b) Confidentiality, Integrity, Availability
A _________protects all company servers and computers by stopping packets from outside the organization’s network that do not meet a strict set of criteria.
a) Spam filter b) Anti-virus c) Firewall d) Encryption
c) Firewall
Which type of access control is used in Windows operating systems?
a) Access Control List b) Role-Based Access Control (RBAC) c) Public Key d) ID/Password
b) Role-Based Access Control (RBAC)
___________determines which users are authorized to read, modify, add, and/or delete information
Access control
__________is used to ensure that the person accessing the information is, indeed, who they present themselves to be
Authentication
__________a process of encoding data upon its transmission or storage so that only authorized individuals can read it.
Encryption
Which of the following is not a type of encryption?
a) symmetric key
b) public-key encryption
c) access control list (ACL)
c) access control list (ACL)
Which of the following is not a type of access control?
a) access control list (ACL)
b) Role-based Access Control (RBAC)
c) symmetric key
c) symmetric key
This device can be placed on the network for security purposes. It does not add any additional security but provides the functionality to identify if a network is being attacked.
a) Intrusion detection system (IDS)
b) Virtual Private Network (VPN)
c) Spyware
d) RSA device
a) Intrusion detection system (IDS)