SSCP Flashcards

0
Q

Referred to as the AIC Security triad:

A
  1. Availability
  2. Integrity
  3. Confidentiality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What are the three primary goals of information security are:

A
  1. Preventing the loss of availability
  2. The lost of integrity
  3. The loss of confidentiality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Organizations protect against loss of availability by using:

A
  1. Backups
  2. Redundant disks
  3. Redundant servers
  4. Redundant connections
  5. Redundant sites
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Backup

A
  • Capture a copy of the data

- A copy of backup data is kept in an offsite location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Redundant disks

A

Redundant Array of independent disks (RAID) systems can automatically switch over to the drive holding the mirrored add without user intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Redundant Server

A

Failover clustering uses multiple servers and ensures that a service is still provided even if a server fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Redundant connections

A

Two or more connections are used so that even if one fails, the organization still has connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Redundant sites

A

Redundant sites are known as hot sites (ready at a moment’s notice), cold sites (an empty building with electricity and running water), and warm sites (a cross between a hot site and a cold site).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Availability

A

Ensures that authorized users can access any resource when it’s needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fault-tolerant and redundant technologies

A

Ensure that availability is not lost even if a system suffers a failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Integrity

A

Prevents any unauthorized or unwanted modification of data. It ensures that data is correct and current.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

hash

A

Is simply a number created by performing a mathematical algorithm against a file or message. As long as the file or message stays the same, the hash (the number) will always be the same.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly