Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/7

Click to flip

7 Cards in this Set

  • Front
  • Back
Non-Volatile is memory that maintains integrity after loss of power
yes
Government data classifications include which of the following:(Choose four)
A. Open
B. Unclassified
C. Confidential
D. Private
E. Secret
F. Top Secret
Answer: B,C,E,F
B. Unclassified
C. Confidential
E. Secret
F. Top Secret
What are the elements of the CIA triad?(Choose three)
A. Confidentiality
B. Accountability
C. Accessibility
D. Integrity
E. Interest
F. Control
G. Availability
A,D,G
G. Availability
D. Integrity
A. Confidentiality
PGP provides which of the following?(Choose three)
A. Confidentiality
B. Accountability
C. Accessibility
D. Integrity
E. Interest
F. Non-repudiation
G. Authenticity
A,D,G
A. Confidentiality
D. Integrity
G. Authenticity
Which aspect of security was the Bell-LaPadula access control model designed to protect?
A. Authenticity
B. Accountability
C. Accessibility
D. Integrity
E. Interest
F. Non-repudiation
G. Confidentiality
G. Confidentiality
Controlling access to information systems and associated networks is necessary for the preservation of their confidentiality, integrity, and availability. Which of the following is NOT a goal of integrity?
A. Preservation of the internal and external consistency of the information
B. Prevention of the modification of information by unauthorized users
C. Prevention of the unauthorized or unintentional modification of information by authorized users
D. Prevention of authorized modifications by unauthorized users
D. Prevention of authorized modifications by unauthorized users
Which one of the following security areas is directly addressed by Kerberos?
A. Confidentiality
B. Frequency analysis
C. Availability
D. Physical attacks
A. Confidentiality