CIA Triad

CIA Triad

9th - 12th Grade

31 Qs

quiz-placeholder

Similar activities

Software Vocabulary

Software Vocabulary

9th - 11th Grade

30 Qs

Informatika Sekarang dan Masa Depan

Informatika Sekarang dan Masa Depan

12th Grade

30 Qs

Pearson 1CP2 - 5.2 - Legislation

Pearson 1CP2 - 5.2 - Legislation

9th - 12th Grade

35 Qs

it.al3

it.al3

12th Grade

30 Qs

N5CS: Database Design and Development Test (SCHOLAR)

N5CS: Database Design and Development Test (SCHOLAR)

10th Grade

28 Qs

Lessons 1-3 Security

Lessons 1-3 Security

12th Grade

33 Qs

Cybersecurity Chapter 1 to 3 summary

Cybersecurity Chapter 1 to 3 summary

11th Grade

30 Qs

CIA Triad

CIA Triad

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Andrew Schmitz

Used 5+ times

FREE Resource

31 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the principle of Confidentiality?

Ensuring that data is accessible to authorized users

Ensuring that data is accurate an unaltered

Ensuring that systems are available for use

Encrypting data to prevent loss

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of maintaining Confidentiality?

Hashing data to verify integrity

Using access control lists (ACLs) to limit access to files

Ensuring redundancy in the network architecture

Implementing fault tolerance

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A system ensuring that data has not been tampered with or altered provides which part of the CIA Triad?

Confidentialily

Integrity

Availability

Authentication

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the best example of a loss of Availability?

Unauthorized access to sensitive data

Data being modified without permission

Denial of Service (DoS) attack on a web server

Sensitive data being encrypted using strong algorithms

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does encryption contribute to the CIA Triad?

Ensures Availability

Ensures Integrity

Ensures Confidentiality

Ensures Authentication

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack threatens the Integrity of data?

Man-in-the-middle (MitM) attack

Denial of Service (DoS) attack

Eavesdropping

Social Engineering

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would ensure Availability in a critical system?

Implementing RAID for redundancy

Using multi-factor authentication (MFA)

Applying encryption to data at rest

Employing hashing algorithms

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?