ISC2 Cybersecurity Certification Exams, Pre & Post
Assessments (Latest 2024/ 2025 Updates STUDY
BUNDLE PACKAGE) 100% Correct Questions and
Verified Answers| Grade A
Adequate security - ANSWERSecurity commensurate with the risk and the
magnitude of harm resulting from the loss, misuse or unauthorized access to or
modification of information. Source: OMB Circular A-130
Administrative controls - ANSWERControls implemented through policy and
procedures.
Artificial intelligence - ANSWERThe ability of computers and robots to simulate
human intelligence and behavior.
Asset - ANSWERAnything of value that is owned by an organization. Include both
tangible items such as information systems and physical property and intangible
assets such as intellectual property.
Authentication - ANSWERAccess control process validating that the identity being
claimed by a user or entity is known to the system, by comparing one or more
factors of identification.
Authorization - ANSWERThe right or a permission that is granted to a system entity
to access a system resource. NIST 800-82 Rev.2
Availability - ANSWEREnsuring timely and reliable access to and use of information
by authorized users.
Baseline - ANSWERA documented, lowest level of security configuration allowed by a
standard or organization.
Biometric - ANSWERBiological characteristics of an individual, such as a fingerprint,
hand geometry, voice, or iris patterns.
Bot - ANSWERMalicious code that acts like a remotely controlled "robot" for an
attacker, with other Trojan and worm capabilities.
Classified or Sensitive Information - ANSWERInformation that has been determined
to require protection against unauthorized disclosure and is marked to indicate its
classified status and classification level when in documentary form.
Confidentiality - ANSWERThe characteristic of data or information when it is not
made available or disclosed to unauthorized persons or processes. NIST 800-66
, Criticality - ANSWERA measure of the degree to which an organization depends on
the information or information system for the success of a mission or of a business
function. NIST SP 800-60 Vol. 1, Rev. 1
data integrity - ANSWERThe property that data has not been altered in an
unauthorized manner. Data integrity covers data in storage, during processing and
while in transit. Source: NIST SP 800-27 Rev A
Encryption - ANSWERThe process and act of converting the message from its
plaintext to ciphertext. Sometimes it is also referred to as enciphering. The two
terms are sometimes used interchangeably in literature and have similar meanings.
General Data Protection Regulation (GDPR) - ANSWERIn 2016, the European Union
passed comprehensive legislation that addresses personal privacy, deeming it an
individual human right.
Governance - ANSWERThe process of how an organization is managed; usually
includes all aspects of how decisions are made for that organization, such as policies,
roles, and procedures the organization uses to make those decisions.
Health Insurance Portability and Accountability Act (HIPAA) - ANSWERThis U.S.
federal law is the most important healthcare information regulation in the United
States. It directs the adoption of national standards for electronic healthcare
transactions while protecting the privacy of individual's health information. Other
provisions address fraud reduction, protections for individuals with health insurance
and a wide range of other healthcare-related activities. Est. 1996
Impact - ANSWERThe magnitude of harm that could be caused by a threat's exercise
of a vulnerability.
Information security risk - ANSWERThe potential adverse impacts to an
organization's operations (including its mission, functions and image and reputation),
assets, individuals, other organizations, and even the nation, which results from the
possibility of unauthorized access, use, disclosure, disruption, modification or
destruction of information and/or information systems.
Integrity - ANSWERThe property of information whereby it is recorded, used and
maintained in a way that ensures its completeness, accuracy, internal consistency
and usefulness for a stated purpose.
International Organization of Standards (ISO) - ANSWERThe ISO develops voluntary
international standards in collaboration with its partners in international
standardization, the International Electro-technical Commission (IEC) and the
International Telecommunication Union (ITU), particularly in the field of information
and communication technologies.
Assessments (Latest 2024/ 2025 Updates STUDY
BUNDLE PACKAGE) 100% Correct Questions and
Verified Answers| Grade A
Adequate security - ANSWERSecurity commensurate with the risk and the
magnitude of harm resulting from the loss, misuse or unauthorized access to or
modification of information. Source: OMB Circular A-130
Administrative controls - ANSWERControls implemented through policy and
procedures.
Artificial intelligence - ANSWERThe ability of computers and robots to simulate
human intelligence and behavior.
Asset - ANSWERAnything of value that is owned by an organization. Include both
tangible items such as information systems and physical property and intangible
assets such as intellectual property.
Authentication - ANSWERAccess control process validating that the identity being
claimed by a user or entity is known to the system, by comparing one or more
factors of identification.
Authorization - ANSWERThe right or a permission that is granted to a system entity
to access a system resource. NIST 800-82 Rev.2
Availability - ANSWEREnsuring timely and reliable access to and use of information
by authorized users.
Baseline - ANSWERA documented, lowest level of security configuration allowed by a
standard or organization.
Biometric - ANSWERBiological characteristics of an individual, such as a fingerprint,
hand geometry, voice, or iris patterns.
Bot - ANSWERMalicious code that acts like a remotely controlled "robot" for an
attacker, with other Trojan and worm capabilities.
Classified or Sensitive Information - ANSWERInformation that has been determined
to require protection against unauthorized disclosure and is marked to indicate its
classified status and classification level when in documentary form.
Confidentiality - ANSWERThe characteristic of data or information when it is not
made available or disclosed to unauthorized persons or processes. NIST 800-66
, Criticality - ANSWERA measure of the degree to which an organization depends on
the information or information system for the success of a mission or of a business
function. NIST SP 800-60 Vol. 1, Rev. 1
data integrity - ANSWERThe property that data has not been altered in an
unauthorized manner. Data integrity covers data in storage, during processing and
while in transit. Source: NIST SP 800-27 Rev A
Encryption - ANSWERThe process and act of converting the message from its
plaintext to ciphertext. Sometimes it is also referred to as enciphering. The two
terms are sometimes used interchangeably in literature and have similar meanings.
General Data Protection Regulation (GDPR) - ANSWERIn 2016, the European Union
passed comprehensive legislation that addresses personal privacy, deeming it an
individual human right.
Governance - ANSWERThe process of how an organization is managed; usually
includes all aspects of how decisions are made for that organization, such as policies,
roles, and procedures the organization uses to make those decisions.
Health Insurance Portability and Accountability Act (HIPAA) - ANSWERThis U.S.
federal law is the most important healthcare information regulation in the United
States. It directs the adoption of national standards for electronic healthcare
transactions while protecting the privacy of individual's health information. Other
provisions address fraud reduction, protections for individuals with health insurance
and a wide range of other healthcare-related activities. Est. 1996
Impact - ANSWERThe magnitude of harm that could be caused by a threat's exercise
of a vulnerability.
Information security risk - ANSWERThe potential adverse impacts to an
organization's operations (including its mission, functions and image and reputation),
assets, individuals, other organizations, and even the nation, which results from the
possibility of unauthorized access, use, disclosure, disruption, modification or
destruction of information and/or information systems.
Integrity - ANSWERThe property of information whereby it is recorded, used and
maintained in a way that ensures its completeness, accuracy, internal consistency
and usefulness for a stated purpose.
International Organization of Standards (ISO) - ANSWERThe ISO develops voluntary
international standards in collaboration with its partners in international
standardization, the International Electro-technical Commission (IEC) and the
International Telecommunication Union (ITU), particularly in the field of information
and communication technologies.