Search Header Logo

CIA Triad

Authored by Darling Joslin

Computers

10th Grade

Used 1+ times

CIA Triad
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the “C” in the CIA Triad stand for? For each question, select the best answer from the choices provided.

Control

Confidentiality

Compliance

Connectivity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes "Integrity" in the CIA Triad? For each question, select the best answer from the choices provided.

Ensuring that only authorized individuals have access to data

Protecting data from unauthorized modifications

Making sure data is available when needed

Encrypting data for secure transmission

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a primary goal of the CIA Triad's Availability principle?

Ensuring data is only accessible by authorized personnel

Verifying the accuracy and completeness of data

Preventing data from being altered or tampered with

Ensuring that data and systems are accessible when needed

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If an organization's website experiences a Distributed Denial of Service (DDoS) attack, which part of the CIA Triad is primarily affected?

Confidentiality

Integrity

Availability

None of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes a violation of confidentiality?

A hacker changes financial records in a database

An employee is unable to access critical files due to a system crash

A phishing attack exposes sensitive user data

A backup server restores outdated information

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tool can help maintain the integrity of a file by detecting unauthorized changes?

Firewall

Backup server

Hash function

Encryption key

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is balancing confidentiality, integrity, and availability important in a cybersecurity strategy?

It ensures that systems are difficult to access

It reduces costs associated with maintaining security systems

It provides a holistic approach to securing data

It allows users to bypass security protocols when necessary

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?