Unit 1 - 1.2.1 - CIA Triad & AAA

Unit 1 - 1.2.1 - CIA Triad & AAA

10th Grade

8 Qs

quiz-placeholder

Similar activities

Welcome to Cyber Security

Welcome to Cyber Security

7th - 12th Grade

10 Qs

Paper Practice 1

Paper Practice 1

9th - 12th Grade

10 Qs

Countermeasures

Countermeasures

9th - 12th Grade

10 Qs

Cybersecurity Workshop-22-23Nov23

Cybersecurity Workshop-22-23Nov23

9th - 12th Grade

10 Qs

CNS61_ch1n2

CNS61_ch1n2

9th Grade - University

13 Qs

CIA Triad

CIA Triad

10th Grade

8 Qs

Level 3

Level 3

10th Grade

10 Qs

Information Security

Information Security

9th - 12th Grade

8 Qs

Unit 1 - 1.2.1 - CIA Triad & AAA

Unit 1 - 1.2.1 - CIA Triad & AAA

Assessment

Quiz

Computers

10th Grade

Medium

Created by

PHILLIP VEET

Used 2+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three fundamental principles of information security, also known as the CIA Triad?

Confidentiality, Integrity, and Authorization

Confidentiality, Integrity, and Availability

Confidentiality, Integrity, and Access Control

Confidentiality, Integrity, and Authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle of the CIA Triad ensures that information remains accurate and complete, and hasn’t been tampered with or modified in any unauthorized way?

Confidentiality

Integrity

Availability

Authentication

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What principle of the CIA Triad ensures that authorized users have timely and reliable access to information and systems when needed?

Confidentiality

Integrity

Availability

Authorization

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the CIA Triad in information security?

To authenticate users accessing the system

To provide a framework for developing and implementing security controls

To ensure data is encrypted

To monitor network traffic

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for the application of scientific principles to provide assurance in explaining what has or has not happened on a computer system?

Digital encryption

Cybersecurity

Digital forensics

Network security

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of hashing or running backups/data through a one-way algorithm in digital forensics?

To authenticate users

To preserve the earliest known state of the data

To provide non-repudiation with the evidence

To encrypt sensitive information

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the AAA framework stand for in the context of network security?

Authentication, Authorization, Accounting

Access, Authorization, Authentication

Authorization, Authentication, Availability

Authentication, Authorization, Auditing

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method of authentication involves verifying the identity of a device, computer, or application to ensure it is authorized to access resources or communicate with other systems?

Multi-factor authentication

Biometric authentication

Credentials-based authentication

Token-based authentication