adplus-dvertising
frame-decoration

Question

CIA triad is also known as ________

a.

NIC (Non-repudiation, Integrity, Confidentiality)

b.

AIC (Availability, Integrity, Confidentiality)

c.

AIN (Availability, Integrity, Non-repudiation)

d.

AIC (Authenticity, Integrity, Confidentiality)

Answer: (b).AIC (Availability, Integrity, Confidentiality)

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. CIA triad is also known as ________

Similar Questions

Discover Related MCQs

Q. When you use the word _____ it means you are protecting your data from getting disclosed.

Q. ______ means the protection of data from modification by unknown users.

Q. When integrity is lacking in a security system, _________ occurs.

Q. _______ of information means, only authorised users are capable of accessing the information.

Q. Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?

Q. This helps in identifying the origin of information and authentic user. This referred to here as __________

Q. Data ___________ is used to ensure confidentiality.

Q. Which of these is not a proper method of maintaining confidentiality?

Q. Data integrity gets compromised when _____ and _____ are taken control off.

Q. ______ is the latest technology that faces an extra challenge because of CIA paradigm.

Q. One common way to maintain data availability is __________

Q. _______ is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

Q. From the options below, which of them is not a threat to information security?

Q. From the options below, which of them is not a vulnerability to information security?

Q. _____ platforms are used for safety and protection of information in the cloud.

Q. Which of the following information security technology is used for avoiding browser-based hacking?

Q. The full form of EDR is _______

Q. _______ technology is used for analyzing and monitoring traffic in network and information flow.

Q. Compromising confidential information comes under _________

Q. Lack of access control policy is a _____________