Search Header Logo

Unit 1 - 1.2.1 - CIA Triad & AAA

Authored by PHILLIP VEET

Computers

10th Grade

Used 7+ times

Unit 1 - 1.2.1 - CIA Triad & AAA
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three fundamental principles of information security, also known as the CIA Triad?

Confidentiality, Integrity, and Authorization

Confidentiality, Integrity, and Availability

Confidentiality, Integrity, and Access Control

Confidentiality, Integrity, and Authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle of the CIA Triad ensures that information remains accurate and complete, and hasn’t been tampered with or modified in any unauthorized way?

Confidentiality

Integrity

Availability

Authentication

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What principle of the CIA Triad ensures that authorized users have timely and reliable access to information and systems when needed?

Confidentiality

Integrity

Availability

Authorization

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the CIA Triad in information security?

To authenticate users accessing the system

To provide a framework for developing and implementing security controls

To ensure data is encrypted

To monitor network traffic

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for the application of scientific principles to provide assurance in explaining what has or has not happened on a computer system?

Digital encryption

Cybersecurity

Digital forensics

Network security

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of hashing or running backups/data through a one-way algorithm in digital forensics?

To authenticate users

To preserve the earliest known state of the data

To provide non-repudiation with the evidence

To encrypt sensitive information

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the AAA framework stand for in the context of network security?

Authentication, Authorization, Accounting

Access, Authorization, Authentication

Authorization, Authentication, Availability

Authentication, Authorization, Auditing

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?