A tornado destroyed a data center. Which side of the CIA triad is most affected?
Authenticity
Availability
Utility
Integrity - correct answer Availability
What element of the Parkerian Hexad is concerned with usefulness?
Integrity
Confidentiality
Utility
Availability - correct answer Utility
Which attribute of the Parkerian hexad allows for proper attribution of the owner of a
dataset?
Possession
Availability
Authenticity
Integrity - correct answer Authenticity
Which type of attack category is an attack against confidentiality?
Interception.
Modification.
, Fabrication.
Interruption. - correct answer Interception.
Which two attributes are included in the concept of risk? Choose two answers.
Threats
Frequency
Vulnerabilities
Impacts - correct answer Threats
Vulnerabilities
Which phase of the incident response (IR) process includes putting the system back
better than the original state?
Post-incident activity.
Containment.
Recovery.
Detection and Analysis - correct answer Recovery.
Which concept refers to adding layers of security to our networks?
Administrative control depth.
Defense in depth.
Physical control depth.
Logical control depth. - correct answer Defense in depth.
Which combination of factors demonstrates multi-factor authentication?
Fingerprint and voice print