EXAM PAPER 2026 COMPLETE Q&A SET
WITH HIGH-QUALITY IMAGES
⫸ Parkerian Hexad - Confidentiality Integrity Availability
Possession - physical deposition of the media on which the data is stored
Authenticity - allows us to talk about the proper attribution as to the
owner or creator of the data in question
Utility - how useful the data is to us
⫸ Attack Types - Interception
Interruption
Modification
Fabrication
⫸ Interception - an attacker has access to data , applications or
environment
⫸ Interruption - attacks cause our assets to become unusable or
unavailable
⫸ Modification - attacks involve tampering with our asset
,⫸ Fabrication - attacks that create false information
⫸ Threat - something that has potential to cause harm
⫸ Vulnerability - weaknesses that can be used to harm us
⫸ Something you know - username , password , PIN
⫸ Something you have - ID badge , swipe card , OTP
⫸ Something you are - fingerprint, Iris Retina scan
⫸ Somewhere you are - geolocation
⫸ Something you do - handwriting , typing , walking
⫸ Authentication - verifying that a person is who they claim to be
⫸ Mutual authentication - Both parties in a transaction to authenticate
each other
- Has digital certificates
, - Prevents man in the middle attacks
- The man in the middle is where the attacker inserts themselves into the
traffic flow
- Ex . Both the PC and server authenticate each other before data is sent
in either direction
⫸ Risk management process - 1. Identify Asset - identifying and
categorizing assets that we're protecting
2. Identify Threats - identify threats
3. Assess Vulnerabilities - look for impacts
4. Assess Risk - asses the risk overall
5. Mitigate Risk - ensure that a given type of threat is accounted for
⫸ Incident response process - Preparation Detection and Analysis
Identification
Containment
Eradication Recovery
Post - incident activity
⫸ Preparation - the activities that we can perform , in advance of the
incident itself in order to better enable us to handle it .