Test Your Knowledge of CIA Triad Principles
23 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which CIA Triad principle has been compromised when a hacker gains access to a company's customer database containing sensitive information?

  • Authentication
  • Integrity
  • Confidentiality (correct)
  • Availability
  • Which CIA Triad principle has been compromised when the finance team mistakenly deletes important financial reports from a company's server?

  • Availability
  • Confidentiality
  • Integrity (correct)
  • Authentication
  • Which CIA Triad principle does the implementation of a new password policy requiring employees to change their passwords every 30 days support?

  • Confidentiality
  • Integrity
  • Availability
  • Authentication (correct)
  • Which CIA Triad principle has been compromised when an employee accidentally sends an email containing confidential information to the wrong recipient?

    <p>Confidentiality</p> Signup and view all the answers

    Which CIA Triad principle has been compromised when a server hosting a website crashes and the website becomes inaccessible?

    <p>Availability</p> Signup and view all the answers

    Which CIA Triad principle has been compromised when an employee deliberately modifies a customer's order information for personal financial gain?

    <p>Integrity</p> Signup and view all the answers

    Which CIA Triad principle has been compromised when the customer support team accidentally discloses a customer's personal information to an unauthorized third party?

    <p>Confidentiality</p> Signup and view all the answers

    Which CIA Triad principle has been compromised when a hacker gains access to a company's customer database containing sensitive information?

    <p>Confidentiality</p> Signup and view all the answers

    Which CIA Triad principle has been compromised when the finance team mistakenly deletes important financial reports from a company's server?

    <p>Integrity</p> Signup and view all the answers

    Which CIA Triad principle does the implementation of a new password policy requiring employees to change their passwords every 30 days support?

    <p>Authentication</p> Signup and view all the answers

    Which CIA Triad principle has been compromised when the network of STU Corporation is infected with malware causing slow computer performance?

    <p>Availability</p> Signup and view all the answers

    Which CIA Triad principle has been compromised when the database of VWX Company is encrypted by ransomware, preventing the company from accessing its own data?

    <p>Availability</p> Signup and view all the answers

    Which CIA Triad principle has been compromised when the backup files of YZA Corporation are corrupted, resulting in the loss of data recovery capability?

    <p>Integrity</p> Signup and view all the answers

    What Parkerian Hexad principle is supported by ABC Corporation's new system that restricts access to certain files to authorized employees only?

    <p>Possession/Control</p> Signup and view all the answers

    What Parkerian Hexad principle is being supported by the grant of administrative privileges to John, an employee at DEF Company?

    <p>Confidentiality</p> Signup and view all the answers

    What Parkerian Hexad principle does the implementation of multi-factor authentication for accessing the online banking system of GHI Corporation support?

    <p>Authenticity</p> Signup and view all the answers

    What Parkerian Hexad principle is being supported by the data backup system implemented by XYZ Company to prevent data loss in case of a system failure?

    <p>Utility</p> Signup and view all the answers

    What Parkerian Hexad principle is supported by the system implemented by the HR department at JKL Corporation, which requires employees to use their employee ID to access the office building?

    <p>Confidentiality</p> Signup and view all the answers

    What Parkerian Hexad principle has been compromised when Jane, an employee at MNO Company, accidentally deletes critical data from the company's server?

    <p>Utility</p> Signup and view all the answers

    What Parkerian Hexad principle is being supported by the intrusion detection system implemented by PQR Corporation to monitor unauthorized access attempts on their network?

    <p>Availability</p> Signup and view all the answers

    What Parkerian Hexad principle is being supported by the system implemented by the IT department at STU Company, which automatically updates software on all computers in the company?

    <p>Utility</p> Signup and view all the answers

    What Parkerian Hexad principle is being supported by the system implemented by VWX Corporation, which encrypts all emails sent within the company?

    <p>Confidentiality</p> Signup and view all the answers

    What Parkerian Hexad principle is supported by the system implemented by the finance team at YZA Company, which requires two authorized signatories to approve any financial transactions?

    <p>Possession/Control</p> Signup and view all the answers

    More Like This

    CIA Triad in Information Security
    8 questions
    Security Basics Quiz
    18 questions

    Security Basics Quiz

    SmarterStarfish5366 avatar
    SmarterStarfish5366
    Use Quizgecko on...
    Browser
    Browser