A company encrypts customer data stored in its database. Which CIA principle is this?
What is confidentiality
This principle ensures information is only accessible to those authorized to see it.
What is confidentiality
This principle ensures data is accurate, complete, and unaltered.
What is integrity
This principle ensures information and systems are accessible when needed.
What is availability
This software scans for and removes malicious programs.
What is antivirus software
A backup server activates after the main server fails. Which principle?
What is availability
A common method to protect confidentiality by scrambling data.
What is encryption
A checksum or hash is used to verify this.
What is data integrity
Backups help maintain availability after this type of event.
What is data loss
Firewalls protect networks by controlling this.
What is traffic
A file’s hash value changes unexpectedly. Which principle is at risk?
What is integrity
This type of attack tricks users into revealing confidential information.
What is phishing
This type of malware modifies files without permission.
What is a virus
This type of attack overwhelms a system to make it unavailable.
What is a DDoS attack
This type of control includes policies, training, and awareness.
What are administrative controls
An employee accidentally deletes critical files. Which principle is impacted?
What is availability
Multi‑factor authentication strengthens confidentiality by requiring this.
What is additional verification
Digital signatures help ensure integrity and this.
What is authenticity
Redundant systems improve availability by providing this.
What is failover
This security model restricts access based on job roles.
What is role‑based access control (RBAC)
A hacker alters financial records without being detected. Which principle is violated?
What is integrity
This principle states users should only have the minimum access needed to do their job.
What is least privilege
This type of attack intercepts and alters communication between two parties.
What is a man‑in‑the‑middle attack
UPS devices protect availability by preventing outages caused by this.
What is power failure
This advanced tool monitors network traffic for suspicious behavior.
What is an intrusion detection system (IDS)