Search Header Logo

IT3101-IAS-PLE

Authored by Ardi Moran

Information Technology (IT)

Professional Development

Used 9+ times

IT3101-IAS-PLE
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker modifies financial records to insert fraudulent transactions. Which triad(s) were directly violated?

CIA – Availability only

CIA – Confidentiality and Integrity

CIA – Integrity only

DAD – Denial and Disclosure

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After a flood destroyed its primary data center, a company relied on its secondary backup facility to restore operations. Which CIA principle was preserved by this action?

Confidentiality

Integrity

Availability

Nonrepudiation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization sets up security policies requiring all employees to attend annual cybersecurity awareness training. What type of control is this?

Technical Control

Operational Control

Managerial Control

Physical Control

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company applies data masking to display only the last four digits of customer credit card numbers. What is the main objective of this technique?

Prevent unauthorized access to entire data

Destroy unnecessary data

Replace sensitive values with random tokens

Encrypt data in transmission

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker intercepts sensitive data being transmitted between a client and a server. Which data state was compromised?

Data in use

Data in transit

Data at rest

Data minimized

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company experiences a ransomware attack. They restore operations by using backup files. Which type of control was applied in the recovery process?

Preventive

Detective

Corrective

Directive

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A power outage corrupts some stored customer files, leading to missing information in their records. This is an example of a violation of which principle?

Confidentiality

Integrity

Availability

Compliance

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?