
CIA Triad and Networking Basics Quiz
Authored by Andrew Schmitz
Information Technology (IT)
11th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
56 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Which scenario represents a violation of Integrity?
A hacker deletes all files from a server
A file is altered without authorization
A system is down for 3 hours
An attacker reads private emails
2.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
A Denial-of-Service (DoS) attack primarily threatens which part of the CIA Triad?
Confidentiality
Integrity
Availability
Authenticity
3.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
A router primarily functions to:
Store user passwords
Connect different networks and route traffic
Block malicious software
Translate domain names into IP addresses
4.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Which of the following describes the Internet?
A single network run by one company
A worldwide collection of interconnected networks
A government-owned resource
A single global server
5.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Which network topology connects each device to a central hub or switch?
Mesh
Star
Ring
Bus
6.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
A firewall can exist as:
Hardware only
Software only
Both hardware and software
Neither hardware nor software
7.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
The Internet of Things (IoT) refers to:
Virtual reality headsets
Everyday objects connected to the internet
Social media platforms
Wireless routers
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?