1.2 Comp Programming - Understanding the CIA Triad

1.2 Comp Programming - Understanding the CIA Triad

9th Grade

10 Qs

quiz-placeholder

Similar activities

Cybersecurity

Cybersecurity

9th - 12th Grade

15 Qs

Welcome to Cyber Security

Welcome to Cyber Security

7th - 12th Grade

10 Qs

CompTIA IT Fundamentals Practice Certification

CompTIA IT Fundamentals Practice Certification

9th Grade

14 Qs

1.4 - Network Attacks

1.4 - Network Attacks

7th - 12th Grade

14 Qs

Technology and Ethics

Technology and Ethics

9th - 12th Grade

14 Qs

Unit 1: Computing and Society (CAS) Mid-Unit Assessment Review

Unit 1: Computing and Society (CAS) Mid-Unit Assessment Review

9th - 12th Grade

10 Qs

ICT

ICT

6th - 10th Grade

15 Qs

18. Cyber security threats Quiz

18. Cyber security threats Quiz

9th - 12th Grade

11 Qs

1.2 Comp Programming - Understanding the CIA Triad

1.2 Comp Programming - Understanding the CIA Triad

Assessment

Quiz

Computers

9th Grade

Hard

Created by

Lisa Fink

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the 'C' in the CIA triad stand for?

Confidentiality

Control

Communication

Compliance

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a measure related to confidentiality?

Passwords

Data Backup

Data Analysis

System Updates

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main focus of integrity in the CIA triad?

Backing up data regularly

Encrypting all data

Providing data access to everyone

Ensuring data is accurate and unaltered

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which example best illustrates a breach of confidentiality?

A website is updated with new content

A backup system is implemented

A server is down for maintenance

A password is shared with unauthorized users

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does availability in the CIA triad ensure?

Data is always backed up

Authorized users can access data when needed

Data is encrypted at all times

Only top-level management can access data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a threat to data availability?

Denial-of-service attacks

Password sharing

Regular updates

Data encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can integrity be compromised?

By unauthorized data alterations

By implementing multi-factor authentication

By encrypting data

By using strong passwords

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?