Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
Which of the following items is NOT primarily used to ensure integrity?
Redundant Array of Inexpensive Disks (RAID) system
Cyclic Redundancy Check (CRC)
The Biba Security model
Hashing Algorithms
This is a dumb question and the dude wrote a book for the explanation... who is proofreading these questions?
RAID systems are mostly concerned with availability and performance.
All of the following were all concerned with integrity, only RAID was NOT mostly concerned with Integrity:
Cyclic Redundancy Check: A cyclic redundancy check (CRC) is a type of function that takes as input a data stream of unlimited length and produces as output a value of a certain fixed size. The term CRC is often used to denote either the function or the function's output. A CRC can be used in the same way as a checksum to detect accidental alteration of data during transmission or storage. CRCs are popular because they are simple to implement in binary hardware, are easy to analyze mathematically, and are particularly good at detecting common errors caused by noise in transmission channels.
Hashing Algorithms: In cryptography, a cryptographic hash function is a hash function with certain additional security properties to make it suitable for use as a primitive in various information security applications, such as authentication and message integrity. A hash function takes a long string (or 'message') of any length as input and produces a fixed length string as output, sometimes termed a message digest or a digital fingerprint. In various standards and applications, the two most-commonly used hash functions are MD5 and SHA-1. In 2005, security flaws were identified in both algorithms. Many security professionals have started making use of SHA-256 and SHA-512 which are stronger hashing algorithms.
The Biba Security Model: he Biba Integrity Model was developed to circumvent a weakness in the Bell-LaPadula computer operating system protection model which did not include the possibility of implicit deletion of security objects by writing to them.
In general, preservation of integrity has three goals: 1/ Prevent data modification by unauthorized parties 2/ Prevent unauthorized data modification by authorized parties 3/ Maintain internal and external consistency (i.e. data reflects the real world)
The Biba model address only the first goal of integrity. The Clark-Wilson model address all 3 goals listed above.
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.