Chapter 1 Review Flashcards

1
Q

In information security, what are the three main goals? (Select the three best answers.)

A. Auditing
B. Integrity
C. Non-Repudiation
D. Confidentiality
E. Risk Assessment
F. Availability
A

Availability, Integrity and Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Tom sends out many e-mails containing secure information to other companies. What concept should be implemented to prove that Tom did indeed send the e-mails?

A. Authenticity
B. Non-Repudiation
C. Confidentiality
D. Integrity

A

B. Non-Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A user receives an e-mail but the e-mail client software says that the digital signature is invalid and the sender of the e-mail cannot be verified. The would-be recipient is concerned about which of the following concepts?

A. Confidentiality
B. Integrity
C. Remediation
D. Availability

A

B. Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cloud environments often reuse the same physical hardware (such as hard drives) for multiple customers. These hard drives are used and reused when customer virtual machines are created and deleted over time. What security concern does this bring up implications for?

A. Availability of virtual machines
B. Integrity of data
C. Data confidentiality
D. Hardware integrity

A

C. Data confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly