CIA Triad and Information Security Quiz

CIA Triad and Information Security Quiz

12th Grade

10 Qs

quiz-placeholder

Similar activities

Cryptography

Cryptography

6th Grade - University

15 Qs

POCS-Ch2.1 (Vocab)

POCS-Ch2.1 (Vocab)

7th - 12th Grade

10 Qs

Unit 3 LO1 recap

Unit 3 LO1 recap

12th Grade

10 Qs

CYB: UNIT 1, LESSON 6 QUIZ

CYB: UNIT 1, LESSON 6 QUIZ

9th - 12th Grade

12 Qs

Review ( Security )

Review ( Security )

12th Grade

16 Qs

computer security

computer security

KG - 12th Grade

12 Qs

Cisco CCST Objective 1

Cisco CCST Objective 1

12th Grade

10 Qs

TeachCyber Unit 2 Review - Risk, Adversity, and Trust

TeachCyber Unit 2 Review - Risk, Adversity, and Trust

9th - 12th Grade

16 Qs

CIA Triad and Information Security Quiz

CIA Triad and Information Security Quiz

Assessment

Interactive Video

Computers

12th Grade

Hard

Created by

Ciara Williams

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the CIA triad stand for in information security?

Confidentiality, Information, Accuracy

Control, Integrity, Access

Confidentiality, Information, Access

Confidentiality, Integrity, Availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a method to prevent snooping?

Using default configurations

Ignoring social engineering

Installing privacy screens

Disabling encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is pretexting in the context of social engineering?

Gaining trust by pretending to be from a trusted entity

Intercepting digital communications

Unauthorized access to data

Using malware to capture login information

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does PII stand for?

Public Information Identifier

Private Information Index

Personally Identifiable Information

Personal Information Integrity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a man-in-the-middle attack?

An attack where the attacker relays and possibly alters communications between two parties

An attack where data is destroyed by malware

An attack where a network is flooded with data packets

An attack where a valid data transmission is repeated or delayed

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can replay attacks be prevented?

Using default configurations

Implementing SSL or TLS

Disabling encryption

Ignoring session tokens

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary cause of hardware failure?

Ignoring social engineering

Encrypting data

Using strong passwords

Overheating

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?