Course Review & High-Yield Study Summary | 2026
Which of the following security principles refers to keeping sensitive information private?
A. Confidentiality
B. Integrity
C. Availability
D. Authentication
A. correct answer Confidentiality refers to keeping sensitive information private.
Which of the following security principles refers to the accuracy and completeness of
information?
A. Confidentiality
B. Integrity
C. Availability
D. Authentication
B. correct answer Integrity refers to the accuracy and completeness of information.
Which of the following security principles refers to ensuring that authorized users have
access to information when needed?
A. Confidentiality
B. Integrity
C. Availability
D. Authentication
, C. correct answer Availability refers to ensuring that authorized users have access to
information when needed.
Which of the following is NOT a guideline in privacy and compliance as applied to
cybersecurity?
A. Use strong passwords
B. Follow a principle of least privilege
C. Use encryption to protect sensitive data
D. Share sensitive data with unauthorized personnel
D. correct answer Sharing sensitive data with unauthorized personnel is not a
guideline in privacy and compliance as applied to cybersecurity.
Which of the following is a requirement of the HIPAA Accountability Act?
A. Encryption of customer financial information during transmission
B. Protection of customer health information
C. Reporting of security breaches to customers
D. Regulation of the use of personal health information
B. correct answer The HIPAA Accountability Act requires protection of customer health
information.
Which of the following is a requirement of the SOX framework?
A. Protection of customer health information
B. Encryption of customer financial information during transmission
C. Reporting of security breaches to customers