21. You are helping your security team consider risk when setting up a new software system. Using the CIA triad, you focus on integrity, availability, and what else?
- Conformity
- Communication
- Confidentiality
- Consent
22. Fill in the blank: A key aspect of the CIA triad is ensuring that data is correct, _____, and reliable.
- authentic
- public
- centralized
- updated
23. For what reasons might disgruntled employees be some of the most dangerous threat actors? Select all that apply.
- They know where to find sensitive information.
- They are less productive than other employees.
- They have access to sensitive information.
- They may have malicious intent.
24. Fill in the blank: The ethical principle of _____ involves adhering to compliance regulations.
- protections
- restrictions
- laws
- guidelines
25. Which of the following statements accurately describe the NIST CSF? Select all that apply.
- It is a voluntary framework.
- Security teams use it as a baseline to manage risk.
- It is only effective at managing short-term risk.
- Its purpose is to help manage cybersecurity risk.
26. Which ethical principle describes the rules that are recognized by a community and enforced by a governing entity?
- Restrictions
- Guidelines
- Protections
- Laws
27. You are helping your security team consider risk when setting up a new software system. Using the CIA triad, you focus on confidentiality, integrity, and what else?
- Activity
- Applications
- Accuracy
- Availability