QUESTIONS WITH CORRECT
ANSWERS
Ensures there are no unauthorized modifications to information or systems intentionally
or unintentionally - Answer- Integrity
Ensures that information and systems are ready to meet the needs of the user at the
time those users request it - Answer- Availability
Exposure of sensitive information to unauthorized individuals - Answer- Disclosure
Unauthorized modification of information - Answer- Alteration
Unintended disruption of an authorized user's legitimate access to information - Answer-
Denial
Enforce CIA in the digital world - Answer- Technical controls
Processes put in place to manage technology in a secure manner - Answer-
Operational Controls
Procedural mechanisms that focus on the mechanics of the risk management process -
Answer- Managerial Controls
Intended to stop a security issue before it occurs - Answer- Preventative
Identify security events that have already occurred - Answer- Detective
Remediates security issues that have already occurred - Answer- Corrective
Seek to prevent an attacker from attempting to violate security policies - Answer-
Deterrent
Controls designed to mitigate the risk associated with exception made to a security
policy - Answer- Compensating