2026 COMPREHENSIVE SOLUTION PASSED
FIRST ATTEMPT GRADED A+
⩥ algorithm. Answer: A mathematical function cryptographic algorithm
that encrypts or decrypts text
⩥ authentication. Answer: Method used to verify the identity claim of a
user
⩥ authorization. Answer: The act of defining the network resources,
applications, and data that may be accessed by a user
⩥ availability. Answer: One of the central principles of the AIC triad. A
core goal of a security professional is to ensure that data and hardware
are available when the user requires them
⩥ confidentiality. Answer: One of the central principles of the AIC triad;
represents a core goal of the security professional to ensure, possibly
through encryption, that sensitive information is protected from
exposure
⩥ due care. Answer: The taking of actions that a reasonable and prudent
person would take in a given situation
,⩥ due diligence. Answer: Refers to taking actions that prevent harm to
persons or their property
⩥ identification. Answer: A unique designation assigned to a member of
a group. A claim presented when desiring access
⩥ integrity. Answer: One of the central principles of the AIC triad;
represents a core goal of a security professional, to ensure that no
changes have occurred to data or a system, thus ensuring the data's
integrity
⩥ job rotation. Answer: The act of shifting individuals between roles and
responsibilities to prohibit security violations
⩥ least privilege. Answer: Security principle that individuals are
provided with the least amount of information required to perform their
jobs or duties
⩥ mandatory vacation. Answer: A security control that allows the
monitoring of business functions without the availability of a principal
or responsible individual
, ⩥ separation of duties. Answer: A security program in which two or
more people are required to independently perform activities to complete
an action
⩥ user ID. Answer: An assigned identification. Every user of the system
should have a unique user ID. Its use must still be authenticated
⩥ certification. Answer: The successful conclusion after a system or
application has been tested against preestablished standards
⩥ vulnerability assessment. Answer: The organized set of steps used to
identify and analyse threats and vulnerabilities to determine an
organization's overall risk
⩥ access control list (ACL). Answer: A list of subjects and assigned
rights used in access control.
⩥ administrative controls. Answer: Controls put in place to enforce
policies and directives as dictated by the organization
⩥ biometrics. Answer: Hardware or software used to measure human
characteristics as part of an authentication system
⩥ data at rest. Answer: Any data in a storage location and not moving
between locations or being processed by an application.