Question
a.
Confidentiality
b.
Integrity
c.
Authenticity
d.
Availability
Posted under Cyber Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. According to the CIA Triad, which of the below-mentioned element is not considered in the triad?
Similar Questions
Discover Related MCQs
Q. This is the model designed for guiding the policies of Information security within a company, firm or organization. What is “this” referred to here?
View solution
Q. CIA triad is also known as ________
View solution
Q. When you use the word _____ it means you are protecting your data from getting disclosed.
View solution
Q. ______ means the protection of data from modification by unknown users.
View solution
Q. When integrity is lacking in a security system, _________ occurs.
View solution
Q. _______ of information means, only authorised users are capable of accessing the information.
View solution
Q. Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?
View solution
Q. This helps in identifying the origin of information and authentic user. This referred to here as __________
View solution
Q. Data ___________ is used to ensure confidentiality.
View solution
Q. Which of these is not a proper method of maintaining confidentiality?
View solution
Q. Data integrity gets compromised when _____ and _____ are taken control off.
View solution
Q. ______ is the latest technology that faces an extra challenge because of CIA paradigm.
View solution
Q. One common way to maintain data availability is __________
View solution
Q. _______ is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.
View solution
Q. From the options below, which of them is not a threat to information security?
View solution
Q. From the options below, which of them is not a vulnerability to information security?
View solution
Q. _____ platforms are used for safety and protection of information in the cloud.
View solution
Q. Which of the following information security technology is used for avoiding browser-based hacking?
View solution
Q. The full form of EDR is _______
View solution
Q. _______ technology is used for analyzing and monitoring traffic in network and information flow.
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cyber Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!