Domain 1: Security and Risk Management - Fundamental Principles of Security - Balanced Security

7 important questions on Domain 1: Security and Risk Management - Fundamental Principles of Security - Balanced Security

Through what lens is information security mostly dealt with?

Only through the eye of confidentiality, integrity and availability are mostly forgotten, until they have been compromised.

Which assets have critical confidentiality requirements?

Company trade secrets

Which assets have critical integrity requirements?

Financial transaction values
  • Higher grades + faster learning
  • Never study anything twice
  • 100% sure, 100% understanding
Discover Study Smart

Which assets have critical Availability requirements?

E-commerce web servers

Which 9 controls can be used to keep the availability requirements in place?

1. Redundant Array of Independent Disks (RAID)
2. Clustering
3. Load balancing
4. Redundant data and power lines
5. Software and data backups
6. Disk shadowing
7. Co-location and offsite facilities
8. Rollback functions
9. Failover configurations

Which 6 controls can be used to keep the Integrity requirements in place?

1. Hashing (data integrity)
2. Configuration management (system integrity)
3. Change control (process integrity)
4. Access control (physical and technical)
5. Software digital signing
6. Transmission Cyclic Redundancy Check (CRC) functions

Which 3 controls can be used to keep the Confidentiality requirements in place?

1. Encryption for data at rest (whole disk, database encryption)
2. Encryption for data in transit (IPSec, TLS, PPTP, SSH)
3. Access control (physical and technical)

The question on the page originate from the summary of the following study material:

  • A unique study and practice tool
  • Never study anything twice again
  • Get the grades you hope for
  • 100% sure, 100% understanding
Remember faster, study better. Scientifically proven.
Trustpilot Logo