3. CIA Triad Quiz

3. CIA Triad Quiz

Professional Development

15 Qs

quiz-placeholder

Similar activities

Mastering Security Basics

Mastering Security Basics

Professional Development

15 Qs

VMware vSphere Pre-Assessment

VMware vSphere Pre-Assessment

Professional Development

15 Qs

Pembekalan Insan DJP Hari 1

Pembekalan Insan DJP Hari 1

Professional Development

15 Qs

Seguridad - Clase 9

Seguridad - Clase 9

Professional Development

12 Qs

GCP_FUNDAMENTALS_QUIZ

GCP_FUNDAMENTALS_QUIZ

Professional Development

15 Qs

Nutrition in Fitness

Nutrition in Fitness

Professional Development

13 Qs

Cyber 2 Module 9

Cyber 2 Module 9

9th Grade - Professional Development

21 Qs

Cryptography Chap-1

Cryptography Chap-1

9th Grade - Professional Development

15 Qs

3. CIA Triad Quiz

3. CIA Triad Quiz

Assessment

Interactive Video

Professional Development

Professional Development

Medium

Created by

Jennifer Clark

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the 'C' in the CIA Triad stand for?

Confidentiality

Central

Control

Communication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a component of the CIA Triad?

Authentication

Availability

Integrity

Confidentiality

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of confidentiality in the CIA Triad?

Making data available to users

Ensuring data is accurate

Verifying the sender of data

Preventing unauthorized access to information

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method is commonly used to ensure confidentiality?

Certificates

Digital signatures

Encryption

Hashing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of access controls in ensuring confidentiality?

To provide non-repudiation

To ensure data availability

To limit who can access certain information

To verify data integrity

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the 'I' in the CIA Triad stand for?

Inclusion

Integrity

Identity

Information

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can integrity be verified when receiving data?

By encrypting the data

By using access controls

By comparing hashes

By ensuring system availability

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?