T1: Today's Security Professional ACS

T1: Today's Security Professional ACS

11th Grade

47 Qs

quiz-placeholder

Similar activities

AP CSP Review

AP CSP Review

9th - 12th Grade

50 Qs

Computer Memory (Cloud storage & Virtual memory)

Computer Memory (Cloud storage & Virtual memory)

11th Grade

45 Qs

BTEC Information Technology: Unit 1 Learning Aim A

BTEC Information Technology: Unit 1 Learning Aim A

11th - 12th Grade

46 Qs

IT Fundamentals Test Part 1

IT Fundamentals Test Part 1

KG - University

49 Qs

Comptia Network+ chapter 1-3 exam

Comptia Network+ chapter 1-3 exam

11th Grade - University

45 Qs

Kuis Informatika Buku Siswa

Kuis Informatika Buku Siswa

11th Grade - University

50 Qs

JARKOM dan Aplikasi Mobile

JARKOM dan Aplikasi Mobile

11th Grade

50 Qs

Network Security Module One

Network Security Module One

9th - 12th Grade

44 Qs

T1: Today's Security Professional ACS

T1: Today's Security Professional ACS

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Andrew Schmitz

Used 1+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

47 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which part of the CIA triad ensures that data is accessible when needed?

Confidentiality

Integrity

Availability

Authentication

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A hospital encrypts patient files to prevent unauthorized viewing. Which CIA principle is most directly protected?

Integrity

Confidentiality

Availability

Nonrepudiation

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A disgruntled employee alters financial records without permission. Which CIA element has been violated?

Confidentiality

Integrity

Availability

Nonrepudiation

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The DAD triad element Disclosure most closely threatens which CIA principle?

Integrity

Availability

Confidentiality

Nonrepudiation

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which example best demonstrates Nonrepudiation?

A user’s encrypted hard drive is protected from theft.

An attacker floods a server with requests.

A digital signature proves the sender cannot deny authorship.

A firewall blocks malicious traffic.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which type of risk occurs when a breach damages customer trust and brand value?

Financial risk

Operational risk

Strategic risk

Reputational risk

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company fined for failing to follow HIPAA requirements has experienced what risk?

Compliance risk

Strategic risk

Operational risk

Reputational risk

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers