(ISC)2 Certified in Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the (ISC)2 Certified in Cybersecurity Exam with comprehensive quizzes and extensive question banks. Enhance your skills with detailed explanations and practice tests designed to improve your expertise for the certification exam. Get exam-ready now!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which of the following represents the CIA triad?

  1. Control, Integrity, Accountability

  2. Confidentiality, Integrity, Availability

  3. Compliance, Independence, Asset Management

  4. Credentialing, Identity, Assurance

The correct answer is: Confidentiality, Integrity, Availability

The CIA triad is a foundational concept in cybersecurity that emphasizes three core principles: Confidentiality, Integrity, and Availability. Confidentiality involves ensuring that sensitive information is accessed only by authorized individuals. This means protecting data from unauthorized access and disclosure. Techniques to maintain confidentiality include encryption, access controls, and secure data storage. Integrity refers to the accuracy and reliability of data throughout its lifecycle. Ensuring integrity means protecting data from unauthorized modification or deletion, which can involve using checksums, hash functions, and audits to verify that data remains unchanged and intact. Availability ensures that information and resources are accessible to authorized users when needed. This can involve implementing redundancy, failover solutions, and proactive monitoring to prevent downtime and ensure systems are functional and accessible. The other options listed do not align with the cybersecurity concepts encapsulated in the CIA triad. For instance, control, accountability, compliance, and credentialing represent different aspects of governance and operational effectiveness rather than the core elements focused on safeguarding information and system accessibility in the context of cybersecurity.