CIA Triad

CIA Triad

9th - 12th Grade

31 Qs

quiz-placeholder

Similar activities

Web Development and Internet Security Quiz

Web Development and Internet Security Quiz

11th Grade

35 Qs

CyberSecurity Intro to CyberSecurity LifeCycle and CIA

CyberSecurity Intro to CyberSecurity LifeCycle and CIA

9th Grade

30 Qs

Cyber Security  lo1&2

Cyber Security lo1&2

8th - 12th Grade

32 Qs

Malware, CyberSecurity Life cycle, and CIA Triad

Malware, CyberSecurity Life cycle, and CIA Triad

9th - 12th Grade

30 Qs

IT I: Technology Basics

IT I: Technology Basics

9th - 12th Grade

32 Qs

Final Exam P3

Final Exam P3

9th - 12th Grade

26 Qs

CYBER I INTRO & TROUBLESHOOTING MODEL By Mr. B

CYBER I INTRO & TROUBLESHOOTING MODEL By Mr. B

12th Grade

30 Qs

Keamanan Informasi C

Keamanan Informasi C

1st - 12th Grade

30 Qs

CIA Triad

CIA Triad

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Andrew Schmitz

Used 4+ times

FREE Resource

31 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the principle of Confidentiality?

Ensuring that data is accessible to authorized users

Ensuring that data is accurate an unaltered

Ensuring that systems are available for use

Encrypting data to prevent loss

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of maintaining Confidentiality?

Hashing data to verify integrity

Using access control lists (ACLs) to limit access to files

Ensuring redundancy in the network architecture

Implementing fault tolerance

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A system ensuring that data has not been tampered with or altered provides which part of the CIA Triad?

Confidentialily

Integrity

Availability

Authentication

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the best example of a loss of Availability?

Unauthorized access to sensitive data

Data being modified without permission

Denial of Service (DoS) attack on a web server

Sensitive data being encrypted using strong algorithms

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does encryption contribute to the CIA Triad?

Ensures Availability

Ensures Integrity

Ensures Confidentiality

Ensures Authentication

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack threatens the Integrity of data?

Man-in-the-middle (MitM) attack

Denial of Service (DoS) attack

Eavesdropping

Social Engineering

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would ensure Availability in a critical system?

Implementing RAID for redundancy

Using multi-factor authentication (MFA)

Applying encryption to data at rest

Employing hashing algorithms

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?