(ISC)2 Certified in Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the (ISC)2 Certified in Cybersecurity Exam with comprehensive quizzes and extensive question banks. Enhance your skills with detailed explanations and practice tests designed to improve your expertise for the certification exam. Get exam-ready now!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which security measure protects data integrity during storage, processing, and transmission?

  1. Encryption

  2. Access Control

  3. Firewalls

  4. Backup

The correct answer is: Encryption

Encryption is the most effective security measure for protecting data integrity during storage, processing, and transmission because it transforms the original data into an unreadable format using algorithms. This transformation ensures that even if the data is intercepted, accessed, or modified, it remains secure from unauthorized access and retains its integrity. When the intended recipient receives the data, they can decrypt it back to its original form, which signifies that the data has not been tampered with during its journey. While access controls, firewalls, and backups are essential components of a comprehensive security strategy, they serve different roles. Access control focuses on restricting who can view or use resources in a computing environment, which is important for maintaining confidentiality but does not specifically address data integrity during transmission. Firewalls act as a barrier to prevent unauthorized access to networks, guarding against external threats, but do not inherently ensure that data remains untampered in transit or at rest. Backups are crucial for data recovery in case of loss, corruption, or system failure but do not actively protect the integrity of the data while it is being processed or transmitted. Thus, encryption uniquely offers the capability to secure data integrity directly throughout its lifecycle by making it resistant to unauthorized changes and maintaining its accuracy.