CIA Flashcards

1
Q

The Information Security Triad comprises these three components:

     a) Firmware, Firewall, Anti-virus
     b) Confidentiality, Integrity, Availability
     c) Firewall, Anti-virus, Biometrics
     d) Confidentiality, Integrity, Anonymity (CIA)
A

b) Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A _________protects all company servers and computers by stopping packets from outside the organization’s network that do not meet a strict set of criteria.

     a) Spam filter
     b) Anti-virus
     c) Firewall
     d) Encryption
A

c) Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of access control is used in Windows operating systems?

     a) Access Control List
     b) Role-Based Access Control (RBAC)
     c) Public Key
     d) ID/Password
A

b) Role-Based Access Control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___________determines which users are authorized to read, modify, add, and/or delete information

A

Access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

__________is used to ensure that the person accessing the information is, indeed, who they present themselves to be

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

__________a process of encoding data upon its transmission or storage so that only authorized individuals can read it.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is not a type of encryption?

a) symmetric key
b) public-key encryption
c) access control list (ACL)

A

c) access control list (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is not a type of access control?

a) access control list (ACL)
b) Role-based Access Control (RBAC)
c) symmetric key

A

c) symmetric key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This device can be placed on the network for security purposes. It does not add any additional security but provides the functionality to identify if a network is being attacked.

a) Intrusion detection system (IDS)
b) Virtual Private Network (VPN)
c) Spyware
d) RSA device

A

a) Intrusion detection system (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly