CIA Triad Principles and Cybersecurity Scenarios

CIA Triad Principles and Cybersecurity Scenarios

Professional Development

15 Qs

quiz-placeholder

Similar activities

GCs Refresh

GCs Refresh

Professional Development

15 Qs

Digi Connect 2023

Digi Connect 2023

Professional Development

20 Qs

Emerging computing Techniques

Emerging computing Techniques

Professional Development

20 Qs

Assessment DxI 800/600 (Hardware)

Assessment DxI 800/600 (Hardware)

Professional Development

10 Qs

Hard Science

Hard Science

Professional Development

10 Qs

CKD Seminar for APRIL Group

CKD Seminar for APRIL Group

Professional Development

15 Qs

BM4085 - Business IT

BM4085 - Business IT

Professional Development

12 Qs

Science quiz

Science quiz

Professional Development

10 Qs

CIA Triad Principles and Cybersecurity Scenarios

CIA Triad Principles and Cybersecurity Scenarios

Assessment

Quiz

Science

Professional Development

Hard

NGSS
MS-ETS1-4

Standards-aligned

Created by

Nisha Rawindaran

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle of the CIA triad is violated when a hospital employee's laptop is stolen and sensitive patient records are accessed?

Confidentiality and Integrity

Availability

Integrity and Availability

None of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack is described in Scenario 2, where a hacker overwhelms a retailer's website during a peak shopping season?

Phishing

Distributed Denial-of-Service (DDoS)

Malware

Man-in-the-Middle

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Scenario 3, what is the result of the software developer downloading a malicious update?

The software becomes faster

The software gains new features

The software's security and functionality are compromised

The software is deleted

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle of the CIA triad is violated in Scenario 2 due to the DDoS attack?

Confidentiality

Integrity

Availability

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main consequence for the retailer in Scenario 2 when the DDoS attack occurs?

Increased sales

Loss of revenue and reputation

Improved website performance

Gain of new customers

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Scenario 1, what does the thief do with the stolen data?

Deletes it

Sells it to a criminal organization

Uses it for personal gain

Publishes it online

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malicious software is mentioned in Scenario 3?

Virus

Worm

Trojan

Spyware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Science