CIA Triad and Security Concepts Quiz

CIA Triad and Security Concepts Quiz

University

80 Qs

quiz-placeholder

Similar activities

IT Skills and Concepts Quiz

IT Skills and Concepts Quiz

10th Grade - University

75 Qs

Database Concepts and SQL Quiz

Database Concepts and SQL Quiz

University

80 Qs

COS G1

COS G1

University

76 Qs

Database Management System Quiz

Database Management System Quiz

University

80 Qs

IAS 2 FINAL EXAMINATION

IAS 2 FINAL EXAMINATION

University

85 Qs

Database and Capacity Management Quiz

Database and Capacity Management Quiz

University

75 Qs

Database Concepts Quiz

Database Concepts Quiz

University

75 Qs

CIA Triad and Security Concepts Quiz

CIA Triad and Security Concepts Quiz

Assessment

Quiz

Computers

University

Hard

Created by

Dac Huynh

Used 1+ times

FREE Resource

80 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The three concepts that form what is often referred to as the CIA triad are ________. These three concepts embody the fundamental security objectives for both data and for information and computing services.

confidentiality, integrity and availability

communication, integrity and authentication

confidentiality, integrity, access control

communication, information and authenticity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A loss of __________ is the unauthorized disclosure of information.

authenticity

confidentiality

reliability

integrity

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Verifying that users are who they say they are and that each input arriving at the system came from a trusted source is _________.

authenticity

credibility

accountability

integrity

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A __________ is any action that compromises the security of information owned by an organization.

security attack

security service

security alert

security mechanism

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ is the protection of transmitted data from passive attacks.

Access control

Data control

Nonrepudiation

Confidentiality

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(n) __________ service is one that protects a system to ensure its availability and addresses the security concerns raised by denial-of-service attacks.

replay

availability

masquerade

integrity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(n) __________ is a potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.

threat

attack

risk

attack vector

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?