SC0-402 Free Dumps Study Materials
Question 16: You have been hired at a large company to manage network security. Prior to your arrival, there
was no one dedicated to security, so you are starting at the beginning. You hold a meeting and are
discussing the main functions and features of network security. One of your assistants asks what the
function of Confidentiality in network security is. Which of the following best describes
Confidentiality?
A. Confidentiality verifies users to be who they say they are. In data communications, authenticating the
sender is necessary to verify
that the data came from the right source. The receiver is authenticated as well to verify that the data is
going to the right
destination.
B. Data communications as well as emails need to be protected in order to maintain appropriate levels of
privacy and confidentiality.
Network security must provide a secure channel for the transmission of data and email that does not allow
eavesdropping by
unauthorized users. Data confidentiality ensures the privacy of data on the network system.
C. The security must limit user privileges to minimize the risk of unauthorized access to sensitive
information and areas of the
network that only authorized users should only be allowed to access.
D. Security must be established to prevent parties in a data transaction from denying their participation
after the business transaction
has occurred. This establishes Confidentiality for the transaction itself for all parties involved in the
transaction.
E. Confidentiality is a security principle that ensures the continuous accuracy of data and information
stored within network systems.
Data must be kept from unauthorized modification, forgery, or any other form of corruption either from
malicious threats or
corruption that is accidental in nature.
Correct Answer: B