PrepAway - Latest Free Exam Questions & Answers

The integrity of data is not related to which of the following?

The integrity of data is not related to which of the following?

PrepAway - Latest Free Exam Questions & Answers

A.
Unauthorized manipulation or changes to data

B.
The modification of data without authorization

C.
The intentional or accidental substitution of data

D.
The extraction of data to share with unauthorized entities

Explanation:
D: The extraction of data to share with unauthorized entities is a confidentiality issue, not an integrity issue. Confidentiality ensures that the necessary level of secrecy is
enforced at each junction of data processing and prevents unauthorized disclosure. This level of confidentiality should prevail while data resides on systems and devices within
the network, as it is transmitted, and once it reaches its destination. Integrity, on the other hand, is the principle that signifies the data has not been changed or manipulated in an
unauthorized manner.
A is incorrect because integrity is related to the unauthorized manipulation or changes to data. Integrity is upheld when any unauthorized modification is prevented. Hardware,
software, and communication mechanisms must work in concert to maintain and process data correctly and move data to intended destinations without unexpected alteration.
The systems and network should be protected from outside interference and contamination.
B is incorrect because the modification of data without authorization is related to integrity. Integrity is about protecting data so that it cannot be changed either by users or
other systems that do not have the rights to do so.
C is incorrect because the intentional or accidental substitution of data is related to integrity. Along with the assurance that data is not modified by unauthorized entities,
integrity is upheld when the assurance of the accuracy and reliability of the information and systems is provided. An environment that enforces integrity prevents attackers, for
example, from inserting a virus, logic bomb, or backdoor into a system that could corrupt or replace data. Users usually affect a system or its data’s integrity by mistake (although
internal users may also commit malicious deeds). For example, a user may insert incorrect values into a data processing application that ends up charging a customer $3,000
instead of $300.


Leave a Reply