exam questions

Exam CISSP-ISSAP All Questions

View all questions & answers for the CISSP-ISSAP exam

Exam CISSP-ISSAP topic 1 question 25 discussion

Actual exam question from ISC's CISSP-ISSAP
Question #: 25
Topic #: 1
[All CISSP-ISSAP Questions]

Which of the following tenets does the CIA triad provide for which security practices are measured? Each correct answer represents a part of the solution. Choose all that apply.

  • A. Integrity
  • B. Accountability
  • C. Availability
  • D. Confidentiality
Show Suggested Answer Hide Answer
Suggested Answer: DAC 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
74gjd_37
4 months, 2 weeks ago
Selected Answer: ACD
The correct answers regarding which tenets are covered by the CIA triad are: A. Integrity - Ensuring that data is accurate, complete, and protected from unauthorized modification. C. Availability - Ensuring that information and systems are accessible and usable when needed by authorized users. D. Confidentiality - Protecting sensitive information from unauthorized disclosure or access. Therefore, the correct answers are A. Integrity, C. Availability, D. Confidentiality
upvoted 1 times
74gjd_37
4 months, 2 weeks ago
"Tenet" refers to a fundamental principle or belief that serves as the foundation for a particular doctrine, theory, or system of thought. In the context of information security and the CIA triad, tenets are core principles that guide the design, implementation, and evaluation of security practices. The CIA triad consists of three key tenets: Confidentiality: This tenet ensures that sensitive information is kept private and inaccessible to unauthorized individuals or entities. Integrity: The integrity tenet focuses on maintaining the accuracy, consistency, and trustworthiness of data by protecting it from unauthorized modification or tampering. Availability: Availability emphasizes ensuring timely access to information and resources whenever needed by authorized users without disruptions caused by attacks, failures, or other factors. By adhering to these foundational principles (tenets), organizations can establish a comprehensive approach to safeguarding their systems and data while achieving desired levels of protection against security threats.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago