21. You are helping your security team consider risk when setting up a new software system. Using the CIA triad, you focus on integrity, availability, and what else?

  • Conformity
  • Communication
  • Confidentiality
  • Consent

22. Fill in the blank: A key aspect of the CIA triad is ensuring that data is correct, _____, and reliable.

  • authentic
  • public
  • centralized
  • updated

23. For what reasons might disgruntled employees be some of the most dangerous threat actors? Select all that apply.

  • They know where to find sensitive information.
  • They are less productive than other employees.
  • They have access to sensitive information.
  • They may have malicious intent.

24. Fill in the blank: The ethical principle of _____ involves adhering to compliance regulations.

  • protections
  • restrictions
  • laws
  • guidelines

25. Which of the following statements accurately describe the NIST CSF? Select all that apply.

  • It is a voluntary framework.
  • Security teams use it as a baseline to manage risk.
  • It is only effective at managing short-term risk.
  • Its purpose is to help manage cybersecurity risk.

26. Which ethical principle describes the rules that are recognized by a community and enforced by a governing entity?

  • Restrictions
  • Guidelines
  • Protections
  • Laws

27. You are helping your security team consider risk when setting up a new software system. Using the CIA triad, you focus on confidentiality, integrity, and what else?

  • Activity
  • Applications
  • Accuracy
  • Availability

Leave a Reply