CIA Triad Flashcards

1
Q

A hospital only allows authorized healthcare personnel within one department access to patient Personal Identifiable Information. When employees move to another department, that access is revoked.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A technology firm maintains an alternate site that is running 24/7, and operations can be moved to this location in the event of a major disaster.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Employees need to have key cards to enter their company offices.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Only authorized personnel at a company have write access to certain files. All other employees have only read access to these files.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company hashes its data files to monitor whether information has been tampered with.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A company employs redundant servers, which means that these systems are duplicated, and in the event of a malfunction, one server will fail over to other.

A

Availibilty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A company’s network infrastructure uses load balancers which will distribute the “load” of tasks such as file requests and data routing to a variety of servers, thereby ensuring that no single device is overburdened.

A

Availibilty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A company employee accidentally sends an email containing sensitive financial information to the wrong recipient.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A hacker uses a man-in-the-middle attack to intercept wireless traffic from users.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A hacker was able to crack a hashed message and change its contents.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A hacker launched a DDoS attack which flooded a website with unwanted traffic from several computers and took the site offline.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An online retailer uses hashing algorithms to verify that the product prices displayed on their website have not been tampered with.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A cloud service provider experiences a power outage at one of its data centers. They have redundant systems in place to ensure that services remain available to clients without interruption.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An e-commerce platform uses checksums to verify that files downloaded by users have not been corrupted or altered during the transfer process.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A law firm stores its legal documents in a secure, encrypted cloud storage system. Only authorized personnel with the correct decryption keys can access these documents. A bank uses multi-factor authentication to ensure that only account holders can access their online banking information protecting it from unauthorized access.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A social media platform uses server clustering and load balancing to handle high traffic, volumes, ensuring that the site remains available to users even during peak times.

A

Availability