The CIA Triad

The CIA Triad

Professional Development

17 Qs

quiz-placeholder

Similar activities

Chapter 7

Chapter 7

Professional Development

20 Qs

Class 6 Review

Class 6 Review

Professional Development

15 Qs

A+ - 17C - Troubleshoot Workstation Security Issues

A+ - 17C - Troubleshoot Workstation Security Issues

Professional Development

20 Qs

6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1

6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1

Professional Development

20 Qs

Block 5 - 2D - Network Protocols

Block 5 - 2D - Network Protocols

Professional Development

17 Qs

CyberSecurity

CyberSecurity

Professional Development

13 Qs

 Network Security Fundamentals

Network Security Fundamentals

Professional Development

20 Qs

Infosec

Infosec

Professional Development

17 Qs

The CIA Triad

The CIA Triad

Assessment

Quiz

Computers

Professional Development

Medium

Created by

The I.T.Factor

Used 2+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the "I" in the CIA triangle stand for?

Integrity

Information

Innovation

Intelligence

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is dumpster diving?

Searching through trash to find sensitive information

Monitoring telephone conversations

Intercepting network traffic

Manipulating individuals to reveal information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary focus of eavesdropping attacks?

Gaining physical access to systems

Listening to private conversations

Manipulating individuals

Destroying data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a hardware failure?

An attacker intercepting network traffic

Physical components of a system malfunctioning

An employee increasing their own salary in the payroll system

A phishing email

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a method to protect against unauthorized modification of information?

Using antivirus software

Following the principle of least privilege

Installing a firewall

Encrypting data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the "A" in the CIA triangle stand for?

Availability

Authentication

Authorization

Accuracy

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a method to protect against snooping?

Using antivirus software

Enforcing a clean desk policy

Installing a firewall

Encrypting data

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?