Which of the following aspects is not covered by the CIA triad?

Computing Concepts and Operating Systems

Quiz
•
Instructional Technology
•
Professional Development
•
Easy
Adam Micallef
Used 1+ times
FREE Resource
32 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Confidentiality
Integrity
Availability
Non-repudiation
2.
MULTIPLE CHOICE QUESTION
30 sec • 3 pts
What is the purpose of non-repudiation?
To ensure accountability by proving actions were taken by an individual or entity, thus preventing disputes
To protect data from unauthorized disclosure
To guarantee data remains unchanged from its creation, transmission, or storage
To ensure data is available when needed
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which two aspects are covered by the two pillars of information security?
Confidentiality and integrity
Integrity and availability
Non-repudiation and authentication
Authentication and confidentiality
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not a component of IAA?
Confidentiality
Integrity
Availability
Non-repudiation
5.
MULTIPLE CHOICE QUESTION
30 sec • 3 pts
What is the purpose of IAA?
To prevent security incidents by using measures such as firewalls, intrusion detection systems, and security policies
To ensure accountability by proving actions were taken by an individual or entity, thus preventing disputes
To guarantee data remains unchanged from its creation, transmission, or storage
To protect data from unauthorized disclosure
6.
MULTIPLE CHOICE QUESTION
30 sec • 3 pts
What does IAA strive to maintain?
Confidentiality, integrity, and availability of informational assets
Data accessibility for authorized individuals or systems
Trustworthiness in electronic transactions
Non-repudiation and authentication
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the interrelationship of process, people, and technology in IAA?
Procedures, policies, and guidelines are processes that organizations use to ensure secure information protection
Safeguarding information assets relies on the participation of people such as employees, contractors, and stakeholders
Integrating technology with processes and people is crucial to maximize security benefits
All of the above
Create a free account and access millions of resources
Similar Resources on Quizizz
30 questions
INFORMATION SECURITY

Quiz
•
Professional Development
31 questions
Other Hospital Information System

Quiz
•
University - Professi...
30 questions
SQL Quiz

Quiz
•
Professional Development
29 questions
Week 8 Quiz-Homework

Quiz
•
Professional Development
28 questions
Google Certified Educator Exam Level 1

Quiz
•
Professional Development
28 questions
Technology Support Services Chapter 1 IT BASICS

Quiz
•
Professional Development
36 questions
Mega Quiz

Quiz
•
7th Grade - Professio...
30 questions
Productivity Tools - MS Office

Quiz
•
6th Grade - Professio...
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade