
The CIA Triad
Authored by prosserclive@yahoo.co.uk prosserclive@yahoo.co.uk
Computers
1st - 8th Grade
Used 153+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
24 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Identify the three principles of enforcing cybersecurity. (3 answers) (2.0.1.1)
Confidentiality
Information
Integrity
Availability
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which principle of cybersecurity prevents prevents the disclosure of information to unauthorized people, resources, or processes. (2.1.1.1)
Confidentiality
Transmission
Integrity
Availability
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which principle of cybersecurity refers to the accuracy, consistency, and trustworthiness of data. (2.1.1.1)
Confidentiality
Transmission
Integrity
Availability
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which principle of cybersecurity information is accessible by authorized users when needed. (2.1.1.1)
Confidentiality
Transmission
Integrity
Availability
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Identify the three possible states of data in cyberspace that requires protection. (3 answers) (2.1.1.2)
Data in transit
Data at rest or in storage
Data to be shared
Data in process
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Identify the best way for an organization to comply with the growing number of privacy related laws. (2.1.1.3)
Security
Technology
Policies
Integrity
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hashing, data validation checks, data consistency checks, and access controls are used to ensure....(2.2.2.3)
data transmission
data availability
data security
data integrity
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?