• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/7

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

7 Cards in this Set

  • Front
  • Back
Non-Volatile is memory that maintains integrity after loss of power
yes
Government data classifications include which of the following:(Choose four)
A. Open
B. Unclassified
C. Confidential
D. Private
E. Secret
F. Top Secret
Answer: B,C,E,F
B. Unclassified
C. Confidential
E. Secret
F. Top Secret
What are the elements of the CIA triad?(Choose three)
A. Confidentiality
B. Accountability
C. Accessibility
D. Integrity
E. Interest
F. Control
G. Availability
A,D,G
G. Availability
D. Integrity
A. Confidentiality
PGP provides which of the following?(Choose three)
A. Confidentiality
B. Accountability
C. Accessibility
D. Integrity
E. Interest
F. Non-repudiation
G. Authenticity
A,D,G
A. Confidentiality
D. Integrity
G. Authenticity
Which aspect of security was the Bell-LaPadula access control model designed to protect?
A. Authenticity
B. Accountability
C. Accessibility
D. Integrity
E. Interest
F. Non-repudiation
G. Confidentiality
G. Confidentiality
Controlling access to information systems and associated networks is necessary for the preservation of their confidentiality, integrity, and availability. Which of the following is NOT a goal of integrity?
A. Preservation of the internal and external consistency of the information
B. Prevention of the modification of information by unauthorized users
C. Prevention of the unauthorized or unintentional modification of information by authorized users
D. Prevention of authorized modifications by unauthorized users
D. Prevention of authorized modifications by unauthorized users
Which one of the following security areas is directly addressed by Kerberos?
A. Confidentiality
B. Frequency analysis
C. Availability
D. Physical attacks
A. Confidentiality