©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM
CRISC Certified in Risk and Information
Systems Control Study Guide with
Complete Solutions
The goal of confidentiality is to - Answer✔️✔️-keep information systems and data
from being accessed by people who do not have the authorization, need-to-know,
or security clearance to access that information
Confidentiality can be achieved through - Answer✔️✔️-security protection
mechanisms
such as rights, privileges, permissions, encryption, authentication, and other access
controls
the opposite of confidentiality - Answer✔️✔️-unauthorized disclosure
Integrity is - Answer✔️✔️-characteristic of data that means the data has not been
subject to unauthorized modification or alteration
1
, ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM
Integrity is achieved - Answer✔️✔️-using checksums, message digests, and other
verification methods
opposite of integrity - Answer✔️✔️-Data alteration
Data modification or alteration can happen - Answer✔️✔️-accidentally, such as
when it may be inadvertently changed because of human error or faulty
transmission media. It can also happen intentionally (which is usually malicious in
nature when this modification is unauthorized) by direct interaction with data
during storage or transmission, such as during an attack
opposite of availability - Answer✔️✔️-data destruction or denial of service
security control is - Answer✔️✔️-measure or protection applied to data, systems,
people, facilities, and other resources to protect them from adverse events
Access controls directly support - Answer✔️✔️-confidentiality and integrity goals of
security
Access controls indirectly support - Answer✔️✔️-goal of availability
An access control essentially means - Answer✔️✔️-proactively ensure that only
authorized personnel are able to access data or the information systems that
process that data
2
CRISC Certified in Risk and Information
Systems Control Study Guide with
Complete Solutions
The goal of confidentiality is to - Answer✔️✔️-keep information systems and data
from being accessed by people who do not have the authorization, need-to-know,
or security clearance to access that information
Confidentiality can be achieved through - Answer✔️✔️-security protection
mechanisms
such as rights, privileges, permissions, encryption, authentication, and other access
controls
the opposite of confidentiality - Answer✔️✔️-unauthorized disclosure
Integrity is - Answer✔️✔️-characteristic of data that means the data has not been
subject to unauthorized modification or alteration
1
, ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM
Integrity is achieved - Answer✔️✔️-using checksums, message digests, and other
verification methods
opposite of integrity - Answer✔️✔️-Data alteration
Data modification or alteration can happen - Answer✔️✔️-accidentally, such as
when it may be inadvertently changed because of human error or faulty
transmission media. It can also happen intentionally (which is usually malicious in
nature when this modification is unauthorized) by direct interaction with data
during storage or transmission, such as during an attack
opposite of availability - Answer✔️✔️-data destruction or denial of service
security control is - Answer✔️✔️-measure or protection applied to data, systems,
people, facilities, and other resources to protect them from adverse events
Access controls directly support - Answer✔️✔️-confidentiality and integrity goals of
security
Access controls indirectly support - Answer✔️✔️-goal of availability
An access control essentially means - Answer✔️✔️-proactively ensure that only
authorized personnel are able to access data or the information systems that
process that data
2