Network-and-Security-Foundation Questions and Answers
Question 17
Which CIA triad component is a driver for enabling role-based access controls?
Options:
A.
Integrity
B.
Availability
C.
Confidentiality
D.
Consistency
Answer:
C
Explanation:
Confidentialityensures that sensitive information is only accessible to authorized individuals.Role-Based Access Control (RBAC)enforces confidentiality by restricting access based on a user's role within an organization, ensuring that only authorized users can view or modify certain data.
Integrityensures data is not altered improperly.
Availabilityensures access to resources but does not manage permissions.
Consistencyis not a CIA triad component.
Question 18
A company is ensuring that its network protocol meets encryption standards.
What is the CIA triad component targeted in the scenario?
Options:
A.
Integrity
B.
Consistency
C.
Availability
D.
Confidentiality
Answer:
D
Explanation:
Confidentialityin IT security ensures that sensitive data remains private and protected from unauthorized access. Encryption is a key measure used to maintain confidentiality by encoding data so that only authorized users can access it.
Integrityensures that data remains accurate and unchanged.
Availabilityensures that data is accessible when needed.