Which of the following contains the primary goals and objectives of security?
A. A network's border perimeter
B. The CIA Triad
C. A stand-alone system
D. The internet - B
Vulnerabilities and risks are evaluated based on their threats against which of the
following?
A. One or more of the CIA Triad principles
B. Data usefulness
C. Due care
D. Extent of liability - A
Which of the following is a principle of the CIA Triad that means authorized subjects are
granted timely and uninterrupted access to objects?
A. Identification
B. Availability
C. Encryption
D. Layering - B
Which of the following is not considered a violation of
confidentiality?
A. Stealing passwords
B. Eavesdropping
C. Hardware destruction
D. Social engineering - C
Which of the following is not true?
A. Violations of confidentiality include human error.
B. Violations of confidentiality include management oversight.
C. Violations of confidentiality are limited to direct intentional attacks.
D. Violations of confidentiality can occur when a transmission is not properly encrypted.
-C
STRIDE is often used in relation to assessing threats against applications or operating
systems. Which of the following is not an element of STRIDE?
A. Spoofing
B. Elevation of privilege
C. Repudiation
D. Disclosure - D