nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #504

CERTIFIED-IN-CYBERSECURITY Question #504: Real Exam Question with Answer & Explanation

The correct answer is C: Preventing data from being altered in an unintended manner. Data integrity refers to ensuring that data is not altered or corrupted in an unintended or unauthorized manner (see the ISC2 Study Guide, Chapter 1, Module 1). For example, in a healthcare setting, data integrity ensures that a patient's medical records are accurately maintained

Security Principles

Question

The concept of data integrity refers to:

Options

  • AEnsuring that data is available to multiple users simultaneously
  • BEnsuring that data is used only for ethical purposes
  • CPreventing data from being altered in an unintended manner
  • DPreventing the decryption of data

Explanation

Data integrity refers to ensuring that data is not altered or corrupted in an unintended or unauthorized manner (see the ISC2 Study Guide, Chapter 1, Module 1). For example, in a healthcare setting, data integrity ensures that a patient's medical records are accurately maintained and not altered without proper authorization. In a banking system, data integrity can ensure that the amount of money transferred from one account to another is accurate and not altered during the transaction process. Ensuring that data is used for ethical purposes (referring to the ethical use and management of data) is related to data governance, not data integrity. Preventing data decryption is related to data confidentiality, not integrity. It focuses on preventing unauthorized access to data. Finally, ensuring that data is available to multiple users at the same time relates to data availability. While this is an important aspect of data governance, it doesn't define data integrity.

Topics

#Data Integrity#CIA Triad#Cybersecurity Principles#Information Security Basics

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions