CIA TRIADS

CIA TRIADS

University

10 Qs

quiz-placeholder

Similar activities

iCIO Contribute - Binus University

iCIO Contribute - Binus University

University

10 Qs

CHAPTER 1: COMPUTER SECURITY REVIEW

CHAPTER 1: COMPUTER SECURITY REVIEW

University

10 Qs

IAS101 - Week 8

IAS101 - Week 8

University

15 Qs

Cyber Security Fundamentals

Cyber Security Fundamentals

University

10 Qs

CIA Triad quiz

CIA Triad quiz

University

14 Qs

[Pre-Test - BSIT-3A] Fundamental_Concepts_in_IAS

[Pre-Test - BSIT-3A] Fundamental_Concepts_in_IAS

University

15 Qs

UTS Pengantar Keamanan Siber dan S_Informasi

UTS Pengantar Keamanan Siber dan S_Informasi

University

10 Qs

Cyber forensic and security

Cyber forensic and security

University

15 Qs

CIA TRIADS

CIA TRIADS

Assessment

Quiz

Computers

University

Medium

Created by

Lakshmi P20CS008

Used 8+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. Which of the following contains the primary goals and objectives of security?

A stand-alone system

A network's border perimeter

The CIA triad

The internet

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. Data should not disclosed to unauthorized is called?

Data Integrity

Privacy

Data Confidentiality

Availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3. What does Integrity of data refer to?

The level of assurance which can be given as to how structured data is

The level of assurance which can be given as to how accurate and trustworthy data is

The level of assurance which can be given as to how strong data is

The level of assurance which can be given as to how to relevant the data is

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

4. CIA stands for?

Central Intelligence Agency

Cyber security Investigation Agency

Cyber security, Internet, Accessibility

Confidentiality, Integrity, Availability

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5. According to the CIA triad, which of the following is not considered in the triad?

Confidentiality

Availability

Integrity

Authenticity

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

6. ----------- That gives the proper service to the users

Availability

Data Integrity

System Integrity

Privacy

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7. Unauthorized person should not modify in an particular system is called?

System integrity

Data Integrity

Authenticity

Availability

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers