version B| Updated New Edi on|2026
Which statement describes cybersecurity?
- It is a framework for security policy development.
- It is a standard-based model for developing firewall technologies to fight against
cybercriminals.
- It is the name of a comprehensive security applica on for end users to protect worksta ons
from being a acked.
- It is an ongoing effort to protect Internet-connected systems and the data associated with
those systems from unauthorized use or harm.
It is an ongoing effort to protect Internet-connected systems and the data associated with those
systems from unauthorized use or harm.
What are two objec ves of ensuring data integrity? (Choose two.)
Data is available all the me.
Data is unaltered during transit.
Access to the data is authen cated.
Data is not changed by unauthorized en es.
Data is encrypted while in transit and when stored on disks.
Data is unaltered during transit.
Data is not changed by unauthorized en es.
A web server administrator is configuring access se(ngs to require users to authen cate first
before accessing certain web pages. Which requirement of informa on security is addressed
through the configura on?
confiden ality
A company is experiencing overwhelming visits to a main web server. The IT department is
developing a plan to add a couple more web servers for load balancing and redundancy. Which
requirement of informa on security is addressed by implemen ng the plan?
availability