<< Prev Question Next Question >>

Question 11/27

An organization does not have controls in place to limit employee access to sensitive customer data.
What is a component of the CIA triad that is violated?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (27q)
Question 1: An organization has experienced injection attacks in the pas...
Question 2: What is the layer of the OSI model that creates, maintains, ...
Question 3: With expanded business opportunities and markets, a company ...
Question 4: An organization's network has been the target of several cyb...
Question 5: An attacker uses login data from a data breach to attempt to...
Question 6: An attacker uses a list of commonly used access credentials ...
Question 7: An organization is the victim of an attack in which an attac...
Question 8: A company is developing a disaster recovery plan for its int...
Question 9: A host is already set up with an operating system. An admini...
Question 10: A company's internal messaging system is being redesigned. T...
Question 11: An organization does not have controls in place to limit emp...
Question 12: A company is developing a data protection methodology in ord...
Question 13: An organization's network has been the target of several cyb...
Question 14: A computer network has software that tracks successful and u...
Question 15: After a series of attacks, an organization needs to bolster ...
Question 16: When setting up a network, a technician needs a router that ...
Question 17: A developer is using shared functions for software code in o...
Question 18: In the process of setting up a Linux-based network system, a...
Question 19: An attacker uses a network device to take over an existing c...
Question 20: Which CIA triad component is a driver for enabling role-base...
Question 21: Which scenario demonstrates a violation of the integrity com...
Question 22: A company is specifically worried about rogue access points....
Question 23: Which layer of the OSI model includes the ICMP?...
Question 24: Which layer of the OSI model includes HTTP?...
Question 25: An attacker uses malicious software to disable network resou...
Question 26: Which statement describes the Integrity tenet of IT security...
Question 27: Which layer of the TCP/IP model includes the Internet Protoc...