COMPLETE SOLUTIONS GRADED
A+
Your Exam Plug
, A ___________ is a potential danger which occurs when a ___________ exploits a vulnerability. -
Answer: threat, threat agent
Which of the following is NOT a category of control types? - Answer: protects or assures the accuracy
and reliability of information and systems.
Integrity is the principle that _________________. - Answer:
An exposure occurs when a vulnerability _____________. - Answer: creates the possibility of incurring a
loss or experiencing harm.
Confidentiality can be protected by implementing which of the following controls? - Answer: Software
digital signing to verify recipients.
Data hiding and data obscuring techniques.
Encrypting data at rest and in transit.
Clustering and load balancing are controls that ________ - Answer: map to the Availability component
of the AIC triad.
Balanced security refers to _____________ - Answer: weighing choices in controls against the
magnitude of risk presented by a variety of threats.
addressing threats and implementing controls for availability, integrity, and confidentiality.
understanding the concepts of the AIC triad.
Which of the following best describes a security program? - Answer: A group of standards, regulations,
and best-practices.