three underlying principles of data protection - correct answer confidentiality, integrity,
and availability
confidentiality - correct answer condition of being private or secret
integrity - correct answer state of being complete or uncorrupted
nonrepudiation process - correct answer changes are tracked by which user account
made them
availability - correct answer data can be accessed when needed
some of the information technology security domains are - correct answer users,
workstations, LAN, WAN, remote access, and system
attack surface - correct answer all the locations and methods that could constitute a
security risk
defense in depth - correct answer having multiple levels of protection
frameworks - correct answer help break down the aspects of a business and security
domains into manageable task areas and tasks
internet of things (IoT) - correct answer describes the connection of nontraditional
computing devices to the internet
LAN - correct answer network infrastructure within a small area
WAN - correct answer network infrastructure for more than one geographic location
users - correct answer staff, vendors, contractors, and guests are the weakest link in
the security chain
remote access - correct answer connect to the computer network remotely
malware - correct answer computer code intentionally written to cause some form of
harm
vulnerability - correct answer flaw or potential for harm
threat - correct answer something that takes a vulnerability to a level where it can be
exploited