(ISC)2 Certified in Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the (ISC)2 Certified in Cybersecurity Exam with comprehensive quizzes and extensive question banks. Enhance your skills with detailed explanations and practice tests designed to improve your expertise for the certification exam. Get exam-ready now!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which characteristic of information ensures it is accessible to authorized users only?

  1. Confidentiality

  2. Integrity

  3. Availability

  4. Authenticity

The correct answer is: Confidentiality

The characteristic of information that ensures it is accessible only to authorized users is confidentiality. Confidentiality is a fundamental principle in cybersecurity that focuses on protecting sensitive information from unauthorized access or disclosure. It entails measures that control who can view or access particular data, ensuring that only those individuals or entities with the proper permissions can obtain it. This is achieved through various security measures such as encryption, access controls, and authentication mechanisms, which help to prevent unauthorized users from accessing confidential information. For instance, implementing user authentication processes ensures that only verified individuals can access sensitive systems or data. While the other characteristics—integrity, availability, and authenticity—are also important aspects of information security, they serve different purposes. Integrity ensures that data remains accurate and unaltered by unauthorized individuals. Availability ensures that the information is accessible to authorized users when needed. Authenticity verifies that the information genuinely comes from a recognized source. Each of these principles plays a distinct role in the overall security posture of an organization, but confidentiality specifically addresses the need to restrict access to authorized users alone.