Aarav is working on a project to secure his company's information system. He needs to ensure the CIA triad principles are followed. What does the C in CIA stand for?
Intro to Cybersecurity

Quiz
•
Other
•
University
•
Medium
Stephanie Allen
Used 14+ times
FREE Resource
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Consistency
Confidentiality
Content
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During a cybersecurity class, Freya learns about the CIA triad. What does the I in CIA stand for?
Integrity
Intuition
Instance
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Arthur is working on a project to improve the security of his company's information system. He is focusing on the CIA triad. What does the A in CIA stand for?
Accessibility
Availability
Authorization
Authentication
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
James, Florence, and Poppy are working on a cybersecurity project. They are discussing which state of data is the easiest to protect. Can you help them?
Data at rest, like the files stored on their computers
Data in transit, like emails they are sending to each other
Data in process, like the data being used by their software
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Amelia, Henry, and Max are working on a cybersecurity project. They are discussing which state of data is the hardest to protect. Amelia thinks it's data at rest, Henry believes it's data in transit, but Max argues that it's data in process. According to Max, which state of data is the hardest to protect?
Data at rest
Data in transit
Data in process
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Ava is sending a confidential document to James over the internet. Which technology should she use to ensure the document's confidentiality?
Encryption
Hashing
Access Control
Authentication
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Isabelle, Rosie, and Noah are working on a project to secure their school's computer network. They decide to use the McCumber Cube model. What are the cybersecurity countermeasures in the McCumber Cube that they should consider?
People, processes and technologies
Authentication, authorization and accounting
Confidentiality, integrity and availability
Functionality, usability and security
Create a free account and access millions of resources
Similar Resources on Quizizz
12 questions
University IT Students Quiz

Quiz
•
University
10 questions
Cyber Security Awareness Quiz

Quiz
•
University
10 questions
Cloud Computing

Quiz
•
University
15 questions
Cybersecurity Terminology Quiz Part 2

Quiz
•
University
15 questions
DC&E Lesson 5 Quiz

Quiz
•
6th Grade - University
16 questions
ISO OVERVIEW

Quiz
•
University
15 questions
BCI Quiz

Quiz
•
University
10 questions
quizzes2

Quiz
•
University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade