New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM ISO27-13-001 Exam - Topic 7 Question 29 Discussion

Actual exam question for GAQM's ISO27-13-001 exam
Question #: 29
Topic #: 7
[All ISO27-13-001 Questions]

A hacker gains access to a webserver and can view a file on the server containing credit card numbers.

Which of the Confidentiality, Integrity, Availability (CIA) principles of the credit card file are violated?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Odelia
4 months ago
Compliance is also a big deal in these situations!
upvoted 0 times
...
Jesse
4 months ago
Availability? Really? I don't see how that applies.
upvoted 0 times
...
Jessenia
4 months ago
Wait, what about integrity? Could that be affected too?
upvoted 0 times
...
Fannie
4 months ago
I agree, it's all about keeping that data safe!
upvoted 0 times
...
Vonda
5 months ago
Definitely confidentiality is violated here.
upvoted 0 times
...
Gilberto
5 months ago
I’m a bit confused because I thought integrity could be violated if the data was altered, but in this case, it seems like confidentiality is the main issue.
upvoted 0 times
...
Pamella
5 months ago
I practiced a similar question where a data breach was involved, and it focused on confidentiality too. I feel pretty confident that’s the right answer here.
upvoted 0 times
...
Mose
5 months ago
I'm not entirely sure, but I remember something about integrity being about data accuracy. This situation seems more about unauthorized access, so maybe it's just confidentiality?
upvoted 0 times
...
Jovita
5 months ago
I think this question is about confidentiality since the hacker can access sensitive information like credit card numbers.
upvoted 0 times
...
Javier
5 months ago
The answer has to be "proxy_pass". That's the standard keyword used to specify the upstream server in a reverse proxy setup.
upvoted 0 times
...
Trinidad
5 months ago
This seems pretty straightforward to me. The cleaners didn't use the approved products because they didn't read the contract. That's a clear failure in communication, so I'm going to go with A - poor communication.
upvoted 0 times
...
Dorothy
5 months ago
This is a tricky one. I'm not entirely confident, but I'm going to go with option C, decision theory. The description of the manager using a strategy to confirm hypotheses and overcome biases seems to fit that approach best.
upvoted 0 times
...
Cecilia
5 months ago
Hmm, I'm a bit unsure here. The question mentions creating a plan to document procedures, but it's not clear exactly what type of plan they're referring to. I'll need to think this through carefully.
upvoted 0 times
...
Jesusa
5 months ago
This looks like a pretty straightforward multiple-choice question on the causes of interference in an LTE TDD system. I'll need to carefully review the options and think through the key factors that can lead to interference.
upvoted 0 times
...
Leonora
5 months ago
Hmm, I'm not sure if that's the best approach. With 750 different components, the Cloud Vision API might struggle to accurately recognize all of them. Maybe we should consider training our own model using transfer learning instead?
upvoted 0 times
...

Save Cancel