PrepAway - Latest Free Exam Questions & Answers

Controlling access to information systems and associate…

Controlling access to information systems and associated networks is necessary for the preservation of their:

PrepAway - Latest Free Exam Questions & Answers

A.
Authenticity, confidentiality and availability

B.
Confidentiality, integrity, and availability.

C.
Integrity and availability.

D.
Authenticity, confidentiality, integrity and availability.

Explanation:
Information security is made up of the following main attributes:
Availability – Prevention of loss of, or loss of access to, data and resources
Integrity – Prevention of unauthorized modification of data and resources
Confidentiality – Prevention of unauthorized disclosure of data and resources
Incorrect Answers:
A: Authenticity is an attribute that stems from the three main attributes.
C: Information security is made up of three main attributes, which includes confidentiality.
D: Authenticity is an attribute that stems from the three main attributes.

Harris, Shon, All In One CISSP Exam Guide, 6th Edition, McGraw-Hill, 2013, pp. 298, 299


Leave a Reply