• Tutorials
  • Courses
  • Tracks

CIA Triad Quiz

Last Updated :
Discuss
Comments

Question 1

Your company handles sensitive financial data, and an employee has accidentally left a laptop with open files in a public area. Someone notices the data and takes a screenshot of it.


What would have prevented this breach of confidentiality?

  • Using strong encryption for sensitive files

  • Setting strict internal policies for file storage

  • Using a VPN for accessing the data remotely

  • Both a and b

Question 2

A banking system experiences an issue where the transaction records in the database are modified by an attacker without authorization. The attacker manipulates account balances and withdrawal amounts.


Which measure would best maintain data integrity and prevent such unauthorized modifications?

  • Using access control lists (ACLs)

  • Implementing digital signatures on transaction data

  • Regularly backing up transaction logs

  • Encrypting database storage

Question 3

A popular e-commerce website faces a DDoS (Distributed Denial of Service) attack. The site becomes unresponsive, and customers cannot access their shopping carts or make purchases.


Which action would improve the availability of the website and mitigate future DDoS attacks?

  • Implementing a load balancer and cloud-based DDoS protection

  • Installing more firewalls

  • Reducing the number of customer accounts

  • Increasing the website's bandwidth

Question 4

A company sends sensitive financial data over email without encryption. An attacker intercepts the email and gains access to sensitive client information.


Which of the following would best protect the confidentiality of sensitive data in emails?

  • Encrypting the email content using PGP (Pretty Good Privacy)

  • Using a secure email provider like ProtonMail

  • Implementing 2-factor authentication (2FA) for email accounts

  • Both a and b

Question 5

Your company’s server is configured to automatically install software updates. However, an attacker compromises the update server and pushes out a malicious software update.


How could you maintain the integrity of the software updates and prevent such attacks?

  • Using digital signatures for software updates

  • Enabling real-time monitoring of software installation

  • Regularly patching the update server

  • All of the above

Question 6

A critical system goes down after a server crash, and the business is unable to access important customer data for several hours.


Which of the following measures ensures availability and reduces downtime in case of such system

  • Implementing regular backups and disaster recovery plans

  • Increasing server storage capacity

  • Encrypting backup files

  • Limiting user access to the system

There are 6 questions to complete.

Take a part in the ongoing discussion