CIA Triad

CIA Triad

9th - 12th Grade

31 Qs

quiz-placeholder

Similar activities

What is Cybersecurity Vocab Quiz

What is Cybersecurity Vocab Quiz

9th - 12th Grade

30 Qs

MSC comp

MSC comp

12th Grade

26 Qs

Introduction to Cybersecurity

Introduction to Cybersecurity

9th Grade

26 Qs

Unit 1 Test

Unit 1 Test

11th Grade

26 Qs

Unit 3 Vocabulary: Data Representation

Unit 3 Vocabulary: Data Representation

12th Grade

29 Qs

Cybersecurity Quiz

Cybersecurity Quiz

9th Grade

33 Qs

PRE TEST (SEBELUM MATERI) - AIJ KELAS 12 - MATERI FIREWALL

PRE TEST (SEBELUM MATERI) - AIJ KELAS 12 - MATERI FIREWALL

KG - 12th Grade

30 Qs

CIA Triad

CIA Triad

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Andrew Schmitz

Used 4+ times

FREE Resource

31 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the principle of Confidentiality?

Ensuring that data is accessible to authorized users

Ensuring that data is accurate an unaltered

Ensuring that systems are available for use

Encrypting data to prevent loss

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of maintaining Confidentiality?

Hashing data to verify integrity

Using access control lists (ACLs) to limit access to files

Ensuring redundancy in the network architecture

Implementing fault tolerance

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A system ensuring that data has not been tampered with or altered provides which part of the CIA Triad?

Confidentialily

Integrity

Availability

Authentication

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the best example of a loss of Availability?

Unauthorized access to sensitive data

Data being modified without permission

Denial of Service (DoS) attack on a web server

Sensitive data being encrypted using strong algorithms

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does encryption contribute to the CIA Triad?

Ensures Availability

Ensures Integrity

Ensures Confidentiality

Ensures Authentication

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack threatens the Integrity of data?

Man-in-the-middle (MitM) attack

Denial of Service (DoS) attack

Eavesdropping

Social Engineering

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would ensure Availability in a critical system?

Implementing RAID for redundancy

Using multi-factor authentication (MFA)

Applying encryption to data at rest

Employing hashing algorithms

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?