The cia triad - Study guides, Class notes & Summaries
Looking for the best study guides, study notes and summaries about The cia triad? On this page you'll find 1076 study documents about The cia triad.
All 1.076 results
Sort by
-
CompTIA Network+ Study Guide: Exam N10-009 (Sybex Study Guide) 6th Edition 2024 with complete solution
- Exam (elaborations) • 2011 pages • 2024
-
- $30.49
- 3x sold
- + learn more
CompTIA Network+ Study Guide: Exam N10-009 (Sybex Study Guide) 6th Edition 2024 with complete solution 
 
Table of Contents 
1. Cover 
2. Table of Contents 
3. Title Page 
4. Copyright 
5. Acknowledgments 
6. About the Authors 
7. About the Technical Editor 
8. Table of Exercises 
9. Introduction 
1. What Is the Network+ Certification? 
2. Why Become Network+ Certified? 
3. How to Become Network+ Certified 
4. Tips for Taking the Network+ Exam 
5. Who Should Read This Book? 
6. What Does This Bo...
-
WGU D430 REVIEW EXAM 2024/ACTUAL EXAM QUESTIONS WITH 100% CORRECT DETAILED ANSWERS/ALREADY GRADED A+
- Exam (elaborations) • 33 pages • 2024 Popular
-
- $12.99
- 2x sold
- + learn more
WGU D430 REVIEW EXAM 2024/ACTUAL EXAM QUESTIONS WITH 100% CORRECT DETAILED ANSWERS/ALREADY GRADED A+ 
 
 
 
The Fabrication attack type most commonly affects which principle(s) of the CIA triad? 
 
 
A.	Availability 
B.	Integrity 
C.	Confidentiality 
D.	Integrity and Availability 
E.	Confidentiality and Integrity answer- Integrity and Availability 
 
 
The Interception attack type most commonly affects which principle(s) of the CIA triad? This task contains the radio buttons and checkboxes for o...
-
WGU C172 Objective Assessment Exam (New 2023/ 2024 Update) Network and Security Foundations| Questions and Verified Answers| 100% Correct |Graded A
- Exam (elaborations) • 16 pages • 2024
-
Available in package deal
-
- $10.99
- 1x sold
- + learn more
WGU C172 Objective Assessment Exam 
(New 2023/ 2024 Update) Network and 
Security Foundations| Questions and Verified 
Answers| 100% Correct |Graded A 
 
QUESTION 
 What type of exploit is occurring when an attacker attempts to hide their identity while 
communicating on a network? 
 
 
Answer: 
 Spoofing 
 
 
 
QUESTION 
 When an attacker is inserting text that is too large to fit within a region of memory, what type of 
attack are they trying to perform? 
 
 
Answer: 
 Buffer overflow 
 
...
-
Wgu Fundamentals of Information Security Exam Questions And Verified Answers 2024.
- Exam (elaborations) • 27 pages • 2024
-
Available in package deal
-
- $9.99
- 1x sold
- + learn more
Controls that protect the systems, networks, and environments that process, transmit, and store our data are called _______. - Answer Logical Controls 
 
During what phase of the incident response process do we determine what happened, why it happened, and what we can do to keep it from happening again? - Answer Post-Incident Activity 
 
Something that has the potential to cause harm to our assets is known as a(n) ________. - Answer Threat 
 
What is the first and arguably one of the...
-
WGU C838 FINAL EXAM TEST BANK 400 QUESTIONS AND ANSWERS LATEST 2023- 2024 MANAGING CLOUD SECURITY COMPLETE TEST BANK | A+GRADE.
- Exam (elaborations) • 47 pages • 2023
- Available in package deal
-
- $12.99
- 2x sold
- + learn more
WGU C838 FINAL EXAM TEST BANK 400 QUESTIONS AND ANSWERS LATEST 2023- 2024 MANAGING CLOUD SECURITY COMPLETE TEST BANK |A +GRADE. 
What NIST publication number defines cloud computing? - ANSWER800-145 
What ISO/IEC standard provides information on cloud computing? - 
ANSWER- 17788 
What is cloud bursting? - ANSWER- Ability to increase available cloud 
resources on demand 
What are 3 characteristics of cloud computing? - ANSWER- Elasticity 
Simplicity 
Scalability 
What is a cloud customer? - ANSWE...
And that's how you make extra money
-
WGU D430 Fundamentals of Information Security Questions and Answers (RATED A)
- Exam (elaborations) • 7 pages • 2023
- Available in package deal
-
- $11.49
- 1x sold
- + learn more
Define the confidentiality in the CIA triad. - ANSWER-Our ability to protect data from those who are not authorized to view it. 
 
Examples of confidentiality - ANSWER-A patron using an ATM card wants to keep their PIN number confidential. 
An ATM owner wants to keep bank account numbers confidential. 
 
How can confidentiality be broken? - ANSWER-Losing a laptop 
An attacker gets access to info 
A person can look over your shoulder 
 
Define integrity in the CIA triad. - ANSWER-The ability to ...
-
GSEC 401.2 Defense-In-Depth Exam QUESTIONS AND EXPERT REVISED ANSWERS >> ALREADY PASSED
- Exam (elaborations) • 11 pages • 2024
-
- $12.39
- 1x sold
- + learn more
GSEC 401.2 Defense-In-Depth Exam QUESTIONS AND EXPERT REVISED ANSWERS >> ALREADY PASSED 
 
 
What are 5 layers of Defense-in-depth security? - Answer -Perimeter 
Network 
Host 
Application 
Data 
 
What is risk? - Answer -Risk is the probability of a threat crossing or touching a vulnerability 
 
Formula for risk - Answer -Threats x Vulnerabilities = Risk 
 
CIA triad - Answer -Confidentiality, Integrity, Availability 
 
What is the foundation of defense-in-depth? - Answer -filtering 
 
Na...
-
WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW QUESTIONS AND ANSWERS ALREADY PASSED
- Exam (elaborations) • 30 pages • 2022
- Available in package deal
-
- $9.99
- 6x sold
- + learn more
WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW QUESTIONS AND ANSWERS ALREADY PASSED 
The Fabrication attack type most commonly affects which principle(s) of the CIA triad? 
A. Availability 
B. Integrity 
C. Confidentiality 
D. Integrity and Availability E. Confidentiality and Integrity Integrity and Availability 
The Interception attack type most commonly affects which principle(s) of the CIA triad? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform thi...
-
WGU Course C836 - Fundamentals of Information Security Questions and Answers Already Passed
- Exam (elaborations) • 34 pages • 2022
-
Available in package deal
-
- $20.99
- 9x sold
- + learn more
Which cybersecurity term is defined as the potential for an attack on a resource? 
 
A Impact 
B Vulnerability 
C Risk 
D Threat 
D 
 
 
Which security type deliberately exposes a system's vulnerabilities or resources to an attacker? 
 
A Intrusion detection 
B Firewalls 
C Honeypots 
D Intrusion prevention 
C 
 
 
Which tool can be used to map devices on a network, along with their operating system types and versions? 
 
A Packet sniffer 
B Packet filter 
C Port scanner 
D Stateful firewall 
C...
-
WGU D430 Fundamentals of Information Security Correct Questions and Answers_100% Already A+ Review Exam Updated. integrity (parkerian hexad) - ANSWER-THIS is the same as from the CIA triad, however this version doesn't account for authorized, but incor
- Exam (elaborations) • 46 pages • 2024
-
- $13.49
- + learn more
WGU D430 Fundamentals of Information Security Correct Questions and Answers_100% Already A+ Review Exam Updated. integrity (parkerian hexad) - ANSWER-THIS is the same as from the CIA triad, however this version doesn't account for authorized, but incorrect, modification of data; the data must be whole and completely unchanged. 
 
Define the confidentiality in the CIA triad. - ANSWER-Our ability to protect data from those who are not authorized to view it. 
 
Examples of confidentiality - ANSWER...
Did you know that on average a seller on Stuvia earns $82 per month selling study resources? Hmm, hint, hint. Discover all about earning on Stuvia