1.2 Comp Programming - Understanding the CIA Triad

1.2 Comp Programming - Understanding the CIA Triad

9th Grade

10 Qs

quiz-placeholder

Similar activities

Quiz 8 (01.09.2021)

Quiz 8 (01.09.2021)

1st - 12th Grade

10 Qs

Basic computer

Basic computer

9th - 12th Grade

8 Qs

Administrasi Infrastruktur Jaringan

Administrasi Infrastruktur Jaringan

1st - 10th Grade

10 Qs

PENILAIAN TENGAH SEMESTER - INFORMATIKA KELAS VII  -

PENILAIAN TENGAH SEMESTER - INFORMATIKA KELAS VII -

9th Grade

15 Qs

Hari 3 - Kuis Coding & Perkenalan AI - Fitri Yanti

Hari 3 - Kuis Coding & Perkenalan AI - Fitri Yanti

1st - 12th Grade

12 Qs

Security

Security

9th Grade

15 Qs

Office

Office

1st - 12th Grade

10 Qs

IT related jobs

IT related jobs

9th Grade

9 Qs

1.2 Comp Programming - Understanding the CIA Triad

1.2 Comp Programming - Understanding the CIA Triad

Assessment

Quiz

Computers

9th Grade

Practice Problem

Hard

Created by

Lisa Fink

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the 'C' in the CIA triad stand for?

Confidentiality

Control

Communication

Compliance

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a measure related to confidentiality?

Passwords

Data Backup

Data Analysis

System Updates

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main focus of integrity in the CIA triad?

Backing up data regularly

Encrypting all data

Providing data access to everyone

Ensuring data is accurate and unaltered

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which example best illustrates a breach of confidentiality?

A website is updated with new content

A backup system is implemented

A server is down for maintenance

A password is shared with unauthorized users

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does availability in the CIA triad ensure?

Data is always backed up

Authorized users can access data when needed

Data is encrypted at all times

Only top-level management can access data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a threat to data availability?

Denial-of-service attacks

Password sharing

Regular updates

Data encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can integrity be compromised?

By unauthorized data alterations

By implementing multi-factor authentication

By encrypting data

By using strong passwords

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers