(ISC)2 Certified in Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the (ISC)2 Certified in Cybersecurity Exam with comprehensive quizzes and extensive question banks. Enhance your skills with detailed explanations and practice tests designed to improve your expertise for the certification exam. Get exam-ready now!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What does an incident potentially jeopardize in an information system?

  1. The efficiency of software applications

  2. The security of customer data

  3. The confidentiality, integrity, or availability of information

  4. The speed of network connections

The correct answer is: The confidentiality, integrity, or availability of information

An incident in an information system can significantly jeopardize the confidentiality, integrity, or availability of information, collectively known as the CIA triad. These three components are foundational to information security practices. Confidentiality refers to the measures taken to ensure that sensitive information is not disclosed to unauthorized individuals. An incident, such as a data breach, can lead to the exposure of confidential data, putting users' private information at risk. Integrity involves maintaining the accuracy and reliability of data. An incident can compromise the integrity of data through unauthorized alterations, which may lead to incorrect or misleading information being utilized or reported. Availability ensures that information and resources are accessible to authorized users when needed. An incident, like a denial-of-service (DoS) attack, can render systems inoperable, thus preventing legitimate users from accessing the information or services they require. While other factors, such as the efficiency of software applications, the speed of network connections, and the security of customer data, can be impacted by incidents, the CIA triad encapsulates the essential concerns of information security in terms of protecting information itself. This makes the third option the most comprehensive and accurate response to the question.