

Information Security and the CIA Triad
Interactive Video
•
Computers, Professional Development, Education, Instructional Technology
•
9th - 12th Grade
•
Practice Problem
•
Hard
Mia Campbell
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the CIA triad stand for in information security?
Confidentiality, Integrity, Availability
Control, Integrity, Access
Confidentiality, Information, Authentication
Confidentiality, Information, Access
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a threat to confidentiality?
Snooping
Eavesdropping
Social Engineering
Data Encryption
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common method used in social engineering attacks?
Network Monitoring
Firewall Installation
Data Encryption
Phishing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack involves intercepting and altering communications between two parties?
Phishing
Man-in-the-Middle Attack
Replay Attack
Denial of Service
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a replay attack primarily used for?
Repeating or delaying valid data transmissions
Blocking network access
Intercepting live communications
Encrypting data
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a major cause of lack of availability in computer systems?
Social Engineering
Denial of Service
Data Encryption
Data Integrity
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a botnet used for in a DDoS attack?
Controlling multiple computers to attack a target
Blocking unauthorized access
Encrypting data
Monitoring network traffic
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?