
Understanding Cyber Security Fundamentals
Authored by Darshankumar Chauhan
Computers
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which principle of the CIA triad ensures that information is only accessible to those authorised to have access?
Integrity
Confidentiality
Availability
Accountability
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the 'I' in the CIA triad stand for?
Identification
Integrity
Information
Inspection
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes 'availability' in the context of cyber security?
Ensuring data is accurate and unaltered
Ensuring data is accessible when needed
Ensuring only authorised users can access data
Ensuring users are held accountable for their actions
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which method is commonly used for user authentication?
Passwords
Data encryption
Firewalls
Data masking
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a principle of the CIA triad?
Confidentiality
Integrity
Availability
Authenticity
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main purpose of data integrity techniques?
To prevent unauthorised access
To ensure data is not altered without detection
To make data available at all times
To identify users
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a data integrity technique?
Hashing
Phishing
Social engineering
Spamming
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?