
ISC2 - CC - Chapter 1 - Module 1
Authored by Sebastian Zamorano
Computers
University
Used 107+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
26 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following concepts represents the three fundamental principles of information security?
CAA Framework
CIA Triad
BIA Triangle
RSA Model
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The CIA Triad helps organizations to achieve a balance between:
Risk assessment and risk management
Security, privacy, and compliance
Technology, people, and processes
Confidentiality, integrity, and availability
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which principle of the CIA Triad refers to the protection of sensitive information from unauthorized disclosure?
Confidentiality
Integrity
Availability
Authorization
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which principle of the CIA Triad ensures that data is reliable, accurate, and consistent?
Confidentiality
Integrity
Availability
Authentication
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The principle of "Integrity" in the CIA Triad ensures that data is:
Secret and hidden
Accessible to authorized users
Free from unauthorized changes or modifications
Regularly backed up
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which principle of the CIA Triad ensures that data is accessible and usable by authorized individuals?
Confidentiality
Integrity
Availability
Authentication
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which principle of the CIA Triad ensures that authorized users can access data and systems when needed?
Confidentiality
Integrity
Availability
Authorization
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?