1.2 Comp Programming - Understanding the CIA Triad

1.2 Comp Programming - Understanding the CIA Triad

9th Grade

10 Qs

quiz-placeholder

Similar activities

Cybersecurity Workshop-22-23Nov23

Cybersecurity Workshop-22-23Nov23

9th - 12th Grade

10 Qs

CC 6:14 - 6:19 Terms

CC 6:14 - 6:19 Terms

9th Grade

11 Qs

Information Security

Information Security

9th Grade

9 Qs

A+ 1002 Chapter 4 Review

A+ 1002 Chapter 4 Review

7th - 12th Grade

15 Qs

CIA TRIAD Cybersecurity Quiz

CIA TRIAD Cybersecurity Quiz

9th Grade

13 Qs

POCS-Ch2.1 (Vocab)

POCS-Ch2.1 (Vocab)

7th - 12th Grade

10 Qs

Information Security

Information Security

9th - 12th Grade

8 Qs

Networks

Networks

8th - 9th Grade

13 Qs

1.2 Comp Programming - Understanding the CIA Triad

1.2 Comp Programming - Understanding the CIA Triad

Assessment

Quiz

Computers

9th Grade

Hard

Created by

Lisa Fink

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the 'C' in the CIA triad stand for?

Confidentiality

Control

Communication

Compliance

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a measure related to confidentiality?

Passwords

Data Backup

Data Analysis

System Updates

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main focus of integrity in the CIA triad?

Backing up data regularly

Encrypting all data

Providing data access to everyone

Ensuring data is accurate and unaltered

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which example best illustrates a breach of confidentiality?

A website is updated with new content

A backup system is implemented

A server is down for maintenance

A password is shared with unauthorized users

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does availability in the CIA triad ensure?

Data is always backed up

Authorized users can access data when needed

Data is encrypted at all times

Only top-level management can access data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a threat to data availability?

Denial-of-service attacks

Password sharing

Regular updates

Data encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can integrity be compromised?

By unauthorized data alterations

By implementing multi-factor authentication

By encrypting data

By using strong passwords

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?