The CIA Triad

The CIA Triad

9th Grade

20 Qs

quiz-placeholder

Similar activities

P0-pengenalan komponen komputer

P0-pengenalan komponen komputer

9th - 12th Grade

16 Qs

Excel - basic

Excel - basic

9th Grade

15 Qs

J808 LO1 and LO2 planning project keywords / terms

J808 LO1 and LO2 planning project keywords / terms

9th - 11th Grade

15 Qs

J277 Test, trace and validate

J277 Test, trace and validate

9th - 11th Grade

21 Qs

Cyber Security Homework 1

Cyber Security Homework 1

7th - 9th Grade

15 Qs

Network Quiz TH

Network Quiz TH

1st - 10th Grade

16 Qs

Cryptography

Cryptography

6th Grade - University

15 Qs

INFORMATIKA_8

INFORMATIKA_8

7th - 9th Grade

15 Qs

The CIA Triad

The CIA Triad

Assessment

Quiz

Computers

9th Grade

Practice Problem

Medium

Created by

Ross Phillips

Used 44+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What role do backups play in ensuring Availability?

To provide redundancy in case of failures
To slow down network traffic
To confuse hackers
To increase system complexity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is the CIA Triad important in protecting against cyber threats?

To increase system complexity
To slow down network traffic
To ensure data remains secure, accurate, and accessible
To confuse hackers

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How is Confidentiality maintained in cybersecurity?

Encryption, access controls, user authentication
Data validation, checksums, digital signatures
Redundancy, backups, robust infrastructure
Firewall, Antivirus, Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which techniques are used to preserve Integrity?

Firewall, Antivirus, Encryption
Data validation, checksums, digital signatures
Encryption, access controls, user authentication
Redundancy, backups, robust infrastructure

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do access controls contribute to maintaining Confidentiality?

By ensuring data accuracy
By preventing data modification
By controlling who can access information
By creating backups

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of redundancy in ensuring Availability?

To slow down network traffic
To provide backup resources
To increase system complexity
To confuse hackers

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three core principles of the CIA Triad in cybersecurity?

Phishing, Malware, Ransomware
Firewall, Antivirus, Encryption
Authentication, Authorization, Accounting
Confidentiality, Integrity, Availability

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?