Which set of terms makes up the CIA triad used in information asset protection within POA?

Study for the ASIS Protection of Assets (POA) Security Management Exam. Prepare with multiple choice questions, explanations, and insights. Get ready to excel in your exam!

Multiple Choice

Which set of terms makes up the CIA triad used in information asset protection within POA?

Explanation:
The main concept here is the CIA triad—confidentiality, integrity, and availability—a framework for protecting information assets. Confidentiality means keeping sensitive data from unauthorized disclosure, achieved through measures like access controls and encryption. Integrity ensures data stays accurate and unaltered except by authorized actions, using tools such as hashing, checksums, and tamper-evident logs. Availability guarantees that authorized users can access information and systems when needed, supported by redundancy, backups, and reliable services. These three goals together guide the security controls used in Protection of Assets. This set matches the standard CIA triad exactly, making it the best choice. The other options mix concepts that aren’t part of the triad: one set emphasizes governance and access terms, another uses Access, Authentication, Assurance and omits confidentiality and availability, and the last adds Accessibility, which isn’t the traditional term in the triad.

The main concept here is the CIA triad—confidentiality, integrity, and availability—a framework for protecting information assets. Confidentiality means keeping sensitive data from unauthorized disclosure, achieved through measures like access controls and encryption. Integrity ensures data stays accurate and unaltered except by authorized actions, using tools such as hashing, checksums, and tamper-evident logs. Availability guarantees that authorized users can access information and systems when needed, supported by redundancy, backups, and reliable services. These three goals together guide the security controls used in Protection of Assets.

This set matches the standard CIA triad exactly, making it the best choice. The other options mix concepts that aren’t part of the triad: one set emphasizes governance and access terms, another uses Access, Authentication, Assurance and omits confidentiality and availability, and the last adds Accessibility, which isn’t the traditional term in the triad.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy