The CIA Triad

The CIA Triad

1st - 8th Grade

24 Qs

quiz-placeholder

Similar activities

kiểm tra tin 8

kiểm tra tin 8

8th Grade

20 Qs

Ôn tập cuối năm - Lớp 5

Ôn tập cuối năm - Lớp 5

5th Grade

20 Qs

mobile1

mobile1

1st Grade

20 Qs

Hojas, libros y mas, Excel

Hojas, libros y mas, Excel

7th Grade

20 Qs

Computer Exam (Grade 3)

Computer Exam (Grade 3)

3rd Grade

20 Qs

Internet dan Topologi

Internet dan Topologi

8th Grade

19 Qs

TIK KELAS 5 TANGGAL 18 MARET 2020

TIK KELAS 5 TANGGAL 18 MARET 2020

4th Grade

20 Qs

PĐ Tinhoc3-k2

PĐ Tinhoc3-k2

1st - 5th Grade

19 Qs

The CIA Triad

The CIA Triad

Assessment

Quiz

Computers

1st - 8th Grade

Practice Problem

Hard

Created by

prosserclive@yahoo.co.uk prosserclive@yahoo.co.uk

Used 153+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

24 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Identify the three principles of enforcing cybersecurity. (3 answers) (2.0.1.1)

Confidentiality

Information

Integrity

Availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle of cybersecurity prevents prevents the disclosure of information to unauthorized people, resources, or processes. (2.1.1.1)

Confidentiality

Transmission

Integrity

Availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle of cybersecurity refers to the accuracy, consistency, and trustworthiness of data. (2.1.1.1)

Confidentiality

Transmission

Integrity

Availability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle of cybersecurity information is accessible by authorized users when needed. (2.1.1.1)

Confidentiality

Transmission

Integrity

Availability

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Identify the three possible states of data in cyberspace that requires protection. (3 answers) (2.1.1.2)

Data in transit

Data at rest or in storage

Data to be shared

Data in process

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the best way for an organization to comply with the growing number of privacy related laws. (2.1.1.3)

Security

Technology

Policies

Integrity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hashing, data validation checks, data consistency checks, and access controls are used to ensure....(2.2.2.3)

data transmission

data availability

data security

data integrity

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?