nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #263

CERTIFIED-IN-CYBERSECURITY Question #263: Real Exam Question with Answer & Explanation

The correct answer is A: Confidentiality. When a device is lost or stolen, unauthorized users may directly access sensitive data stored on the device. Therefore, the primary security principle at risk is confidentiality (see ISC2 Study Guide, Module 1, under CIA Deep Dive). In some instances, unauthorized users could als

Security Principles

Question

Which one of the following security principles is PRIMARILY at risk when a device is lost or stolen?

Options

  • AConfidentiality
  • BNon-repudiation
  • CIntegrity
  • DAuthentication

Explanation

When a device is lost or stolen, unauthorized users may directly access sensitive data stored on the device. Therefore, the primary security principle at risk is confidentiality (see ISC2 Study Guide, Module 1, under CIA Deep Dive). In some instances, unauthorized users could also try to compromise integrity but this would not be the primary concern by comparison with confidentiality. In both scenarios, the unauthorized users would be bypassing authentication mechanisms, thus avoiding identity verification. Finally, non-repudiation is not applicable in this context, as it primarily ensures that a party cannot deny the authenticity of their actions.

Topics

#Confidentiality#Security Principles#Data Loss#Device Security

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions