Unit 1 - 1.2.1 - CIA Triad & AAA

Unit 1 - 1.2.1 - CIA Triad & AAA

10th Grade

8 Qs

quiz-placeholder

Similar activities

CNS-QUIZ1

CNS-QUIZ1

1st Grade - University

10 Qs

GenCyber Cybersecurity Concepts

GenCyber Cybersecurity Concepts

9th - 12th Grade

6 Qs

Email

Email

8th - 10th Grade

10 Qs

CCST Security and Privacy Concepts - Chapter 18

CCST Security and Privacy Concepts - Chapter 18

9th - 12th Grade

8 Qs

InfoSec: C.I.A. Triangle

InfoSec: C.I.A. Triangle

10th Grade - University

10 Qs

LAN Security

LAN Security

9th Grade - Professional Development

12 Qs

Confidentiality, Integrity, and Availability

Confidentiality, Integrity, and Availability

9th - 12th Grade

11 Qs

Unit 1 - 1.2.1 - CIA Triad & AAA

Unit 1 - 1.2.1 - CIA Triad & AAA

Assessment

Quiz

Computers

10th Grade

Hard

Created by

PHILLIP VEET

Used 5+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three fundamental principles of information security, also known as the CIA Triad?

Confidentiality, Integrity, and Authorization

Confidentiality, Integrity, and Availability

Confidentiality, Integrity, and Access Control

Confidentiality, Integrity, and Authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle of the CIA Triad ensures that information remains accurate and complete, and hasn’t been tampered with or modified in any unauthorized way?

Confidentiality

Integrity

Availability

Authentication

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What principle of the CIA Triad ensures that authorized users have timely and reliable access to information and systems when needed?

Confidentiality

Integrity

Availability

Authorization

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the CIA Triad in information security?

To authenticate users accessing the system

To provide a framework for developing and implementing security controls

To ensure data is encrypted

To monitor network traffic

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for the application of scientific principles to provide assurance in explaining what has or has not happened on a computer system?

Digital encryption

Cybersecurity

Digital forensics

Network security

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of hashing or running backups/data through a one-way algorithm in digital forensics?

To authenticate users

To preserve the earliest known state of the data

To provide non-repudiation with the evidence

To encrypt sensitive information

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the AAA framework stand for in the context of network security?

Authentication, Authorization, Accounting

Access, Authorization, Authentication

Authorization, Authentication, Availability

Authentication, Authorization, Auditing

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method of authentication involves verifying the identity of a device, computer, or application to ensure it is authorized to access resources or communicate with other systems?

Multi-factor authentication

Biometric authentication

Credentials-based authentication

Token-based authentication