18 Questions
Which of the following is NOT a key component of the CIA triad in information security?
Authenticity
What is the primary goal of the confidentiality principle in the CIA triad?
To prevent the disclosure of sensitive information to unauthorized parties
Which of the following threats to confidentiality is NOT mentioned in the text?
Insider Threats
What is the primary focus of the integrity principle in the CIA triad?
Maintaining the accuracy and completeness of data
Which of the following is NOT a key component of the CIA triad that is related to the people who use the information?
Confidentiality
Which of the following best describes the relationship between the CIA triad and the authentication and non-repudiation concepts mentioned in the text?
The CIA triad and authentication/non-repudiation are complementary and interrelated concepts in information security
What is the purpose of authentication in the context of information systems?
Confirming the identity of users
Which method of authentication involves a swipe card with a magnetic strip?
Key fob
What does non-repudiation aim to achieve in terms of security?
Traceability of actions to entities
Which authentication method involves the use of retinal scanners and fingerprint readers?
Biometrics
What does a key fob do in the context of authentication?
Generates random passwords for users
How does a digital certificate aid in authentication?
Verifies the authenticity of its owner
What does data integrity assure?
That information and programs are changed only in a specified and authorized manner
Which aspect of the CIA triad focuses on the assurance that a system performs its operations in an unimpaired manner?
System integrity
What does availability assure in the context of the CIA triad?
Resources are accessible to authorized parties when needed
Which type of act can compromise availability due to unintentional actions?
Overwriting data or compromising systems by organizational staff
In the CIA Triad, which concept is a natural result of confidentiality and integrity?
Availability
What are examples of intentional acts that can affect availability?
Denial of service (DoS)
Test your knowledge on authentication methods in the CIA Triad model for information security. Learn about user ID, passwords, swipe cards, and other methods used to verify identities.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free