CodeHS 1.2 - Understanding the CIA Triad

CodeHS 1.2 - Understanding the CIA Triad

10th Grade

10 Qs

quiz-placeholder

Similar activities

Cryptography Quiz

Cryptography Quiz

10th Grade

5 Qs

INTRO TO INFORMATION SECURITY

INTRO TO INFORMATION SECURITY

1st - 10th Grade

10 Qs

IBA/CIW REVIEW TEST-B

IBA/CIW REVIEW TEST-B

9th - 12th Grade

15 Qs

Activity 2.3 - Principles of Cybersecurity

Activity 2.3 - Principles of Cybersecurity

9th - 12th Grade

8 Qs

Quis Keamanan Data

Quis Keamanan Data

10th Grade

10 Qs

Global Connectivity Quiz

Global Connectivity Quiz

9th - 12th Grade

15 Qs

Quiz on Confidentiality and Information Security

Quiz on Confidentiality and Information Security

10th Grade

10 Qs

CS 105 Final Review

CS 105 Final Review

9th - 12th Grade

10 Qs

CodeHS 1.2 - Understanding the CIA Triad

CodeHS 1.2 - Understanding the CIA Triad

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Lisa Fink

Used 20+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

Which principle of the CIA triad is concerned with ensuring that only authorized individuals have access to sensitive information?

Confidentiality

Integrity

Availability

2.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

Which aspect of the CIA triad is violated if a hacker alters the contents of a database without permission?

Confidentiality

Integrity

Availability

3.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

If a system is down and users cannot access their files, which part of the CIA triad is affected?

Confidentiality

Integrity

Availability

4.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

Encrypting data before sending it over the internet primarily protects which aspect of the CIA triad?

Confidentiality

Integrity

Availability

5.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

A backup system is implemented to ensure data can be restored after a hardware failure. Which principle does this support?

Confidentiality

Integrity

Availability

6.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

Digital signatures are used to verify that a message has not been altered. Which part of the CIA triad does this relate to?

Confidentiality

Integrity

Availability

7.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

A company uses strong passwords and access controls to prevent unauthorized access to its network. Which principle is this?

Confidentiality

Integrity

Availability

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?