CIA Flashcards

1
Q

CIA represents

A

confidentiality, integrity, and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A federal technology agency that works with industry to develop and apply technology, measurements, and standards

A

National Institute of Standards and Technology (NIST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A publicly announced standardizations developed by the United States Federal Government for use in computer systems by all nonmilitary government agencies and government contractors

A

Federal Information Processing Standard (FIPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The three categories of security controls that are endorsed by both FIPS and NIST are

A

Technical, Operational, Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Access controls, audit and accountability, identification and authentication, along with system and communications protection are good examples of

A

Technical security control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Awareness and training, configuration management, contingency planning, incident response, maintenance, media protection, physical and environmental protection, personnel security, and system and information integrity are good examples of

A

Operational security control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Certification and accreditation, planning, risk assessment, system and services acquisition, and program management fall under

A

Management security control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Preventing the unauthorized access of information to individuals or systems

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Under confidentiality, the process of taking cleartext (plain text) and scrambling it into ciphertext, is known as

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A barrier that will either permit or deny access to a physical location or part of the network infrastructure is called what ?

A

Access control system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Under confidentiality, the process of converting cyphertext back to cleartext (plain text) is known as

A

Decrypption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hiding data within a picture file is know as

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

These three mechanisms of encryption, access controls, and steganography can be used as part of

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The protection of data to ensure that from a source to a destination, the data has not been altered

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

hashing, digital signatures, certificates, through to nonrepudiation are goals of

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_________ are used to validate to a recipient that the person that sent a message was indeed the person that sent i

A

Digital signatures

17
Q

_______ the ascertain, the identities of either individual users, computers, or other entities on a network

A

Certificate

18
Q

Ensure that resources are available for any service that you offer an end user or a consumer is:

A

Availability

19
Q

Three mechanisms that make a network resilient (available) are

A

redundancy, fault tolerance, and patching

20
Q

What additional two properties were added to the C-I-A Triad by ISO 7498-2?

A

• authentication: the ability of a system to confirm the identity of a sender
• nonrepudiation or accountability: the ability of a system to confirm that a
sender cannot convincingly deny having sent something

21
Q

What additional property did U.S. Department of Defense [DOD85] add to the C-I-A Triad in addition to what was amended by ISO 7498-2?

A

auditability: the ability of a system to trace all actions related to a given asset.

22
Q

The integrity of an item has been preserved when the item is:

A
Precise
Accurate
Unmodified
Modified only in acceptable ways
Modified only by authorized people
Modified only by authorized processes
Consistent
Meaningful and usable