
2.1.1 & 2.1.2 Cyber CIA and Passive Analysis
Authored by Robin Robertson
Computers
10th - 12th Grade
Used 81+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
24 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The hardware and software used to help organize and analyze data.
ecommerce
CIA Triad
information systems
confidentiality
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The buying and selling of goods or services over the internet.
information system
ecommerce
availability
CIA Triad
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A model designed to guide policies for information security within an organization.
ecommerce
information system
CIA Triad
integrity
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Protecting information that is sensitive or private from unauthorized access.
confidentiality
availability
integrity
CIA Triad
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This component of the CIA Triad is designed to protect data from deletion or modification from any unauthorized party.
ecommerce
confidentiality
availability
integrity
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This component of the CIA Triad refers to the actual accessibility of data. When and how it is accessed.
availibility
integrity
confidentiality
information system
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data
ecommerce
CIA Triad
Internet of Things (IoT)
Secure Socket Layers
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?