ExamGecko
Question list
Search
Search

Question 39 - ICS-SCADA Cyber Security discussion

Report
Export

Which component of the IT Security Model is attacked with modification?

A.
Authentication
Answers
A.
Authentication
B.
Availability
Answers
B.
Availability
C.
Integrity
Answers
C.
Integrity
D.
Confidentiality
Answers
D.
Confidentiality
Suggested answer: C

Explanation:

Modification attacks directly impact the integrity of data within the IT Security Model. Integrity ensures that information is accurate and unchanged from its original form unless altered by authorized means. An attack that involves modification manipulates data in unauthorized ways, thereby compromising its accuracy and reliability.

Reference:

Shon Harris, 'CISSP Certification: All-in-One Exam Guide'.

asked 18/09/2024
Krzychu Kn
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first