Which term best fits the overarching practice of protecting information and information systems?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which term best fits the overarching practice of protecting information and information systems?

Explanation:
Information security is the umbrella practice for protecting information and information systems from unauthorized access, disclosure, modification, or destruction, and for ensuring availability. It centers on the CIA triad—confidentiality, integrity, and availability—and uses a mix of governance, policies, procedures, and technical controls to manage risk. Think of it as the discipline that covers authentication and access control, encryption, secure coding, patch management, backups, monitoring, incident response, and disaster recovery. The other terms don’t fit this role: daisy chaining describes connecting devices in sequence, which can introduce security weaknesses rather than protect assets; a worm is a type of malware, not a protective practice; and hack value isn’t a standard term for information protection.

Information security is the umbrella practice for protecting information and information systems from unauthorized access, disclosure, modification, or destruction, and for ensuring availability. It centers on the CIA triad—confidentiality, integrity, and availability—and uses a mix of governance, policies, procedures, and technical controls to manage risk. Think of it as the discipline that covers authentication and access control, encryption, secure coding, patch management, backups, monitoring, incident response, and disaster recovery. The other terms don’t fit this role: daisy chaining describes connecting devices in sequence, which can introduce security weaknesses rather than protect assets; a worm is a type of malware, not a protective practice; and hack value isn’t a standard term for information protection.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy