Confidentiality, Integrity, and Availability Exercise

Question 1
Your company handles sensitive financial data, and an employee has accidentally left a laptop with open files in a public area. Someone notices the data and takes a screenshot of it.

What would have prevented this breach of confidentiality?

Question 2
A banking system experiences an issue where the transaction records in the database are modified by an attacker without authorization.

Which measure would best maintain data integrity and prevent such unauthorized modifications?

Question 3
A popular e-commerce website faces a DDoS (Distributed Denial of Service) attack. The site becomes unresponsive.

Which action would improve the availability of the website and mitigate future DDoS attacks?

Question 4
A company sends sensitive financial data over email without encryption. An attacker intercepts the email.

Which of the following would best protect the confidentiality of sensitive data in emails?

Question 5
Your company’s server is configured to automatically install software updates. An attacker compromises the update server.

How could you maintain the integrity of the software updates and prevent such attacks?

Question 6
A critical system goes down after a server crash, and the business cannot access customer data for hours.

Which of the following ensures availability and reduces downtime?