Join the discussion
Question 1/28
Which component of the IT Security Model is attacked with modification?
Correct Answer: C
Modification attacks directly impact the integrity of data within the IT Security Model. Integrity ensures that information is accurate and unchanged from its original form unless altered by authorized means. An attack that involves modification manipulates data in unauthorized ways, thereby compromising its accuracy and reliability.
Reference:
Shon Harris, "CISSP Certification: All-in-One Exam Guide".
Reference:
Shon Harris, "CISSP Certification: All-in-One Exam Guide".
Add Comments
- Other Question (28q)
- Q1. Which component of the IT Security Model is attacked with modification?...
- Q2. When monitoring a network, you receive an ICMP type 8 packet. What does this represent?...
- Q3. Which publication from NIST provides guidance on Industrial Control Systems?...
- Q4. How many IPsec rules are there in Microsoft Firewall configuration?...
- Q5. Which of the ICS/SCADA generations is considered networked?...
- Q6. Which of the following components is not part of the Authentication Header (AH)?...
- Q7. Which of the ICS/SCADA generations is considered monolithic?...
- Q8. Which component of the IT Security Model is the highest priority in ICS/SCADA Security?...
- Q9. Which of the following is NOT an exploit tool?...
- Q10. Which component of the IT Security Model is usually the least priority in ICS/SCADA Securi...
- Q11. Which mode within IPsec provides a secure connection tunnel between two endpoints AND prot...
- Q12. Which of the registrars contains the information for the domain owners in Europe?...
- Q13. Which of the following are required functions of information management?...
- Q14. Which of the CVSS metrics refer to the exploit quotient of the vulnerability?...
- Q15. Which of the following is considered the best way to counter packet monitoring for a switc...
- Q16. What is the size of the AH in bits with respect to width?...
- Q17. What type of communication protocol does Modbus RTU use?...
- Q18. Which of the following are valid TCP flags?
- Q19. Which type of Intrusion Prevention System can monitor and validate encrypted data?...
- Q20. What is the maximum size in bytes of an ethernet packet?...
- Q21. What is the default size in bits of the Windows Echo Request packet?...
- Q22. The vulnerability that led to the WannaCry ransomware infections affected which protocol?...
- Q23. Which component of the IT Security Model is attacked with interruption?...
- Q24. Which of the following are not a part of the temporal score in the CVSS? (Select all that ...
- Q25. Which of the following is the stance that by default has a default deny approach?...
- Q26. In physical to logical asset protections, what threat can be directed against the network?...
- Q27. Which of the following names represents inbound filtering?...
- Q28. Which of the options in the netstat command show the routing table?...
