1) What does the "C" in the CIA Triad stand for? a) Confidentiality b) Compliance c) Cryptography d) Control 2) Which of the following best describes Authentication in the AAA framework? a) Determining what resources a user can access b) Verifying the identity of a user or device c) Keeping logs of user activities d) Encrypting network traffic 3) What does the last "D" in the DAD security model stand for? a) Destruction b) Denial c) Detection d) Data 4) In the CIA Triad, Integrity ensures that: a) Data is only accessible by authorized users b) Data remains accurate and unaltered c) Systems are always available d) Users cannot deny their actions 5) What is an example of Non-repudiation? a) Encrypting a hard drive to protect data b) A firewall blocking unauthorized access c) Digital signatures ensuring the sender cannot deny sending a message d) Using a strong password to authenticate users 6) Why is Non-repudiation used in security? a) To prevent unauthorized access b) To ensure users cannot deny their actions c) To restrict user permissions d) To encrypt sensitive data 7) In the AAA framework, what does Authorization determine? a) Who can log into a system b) What resources a user is allowed to access c) If a system is available for use d) How long logs are stored 8) What security principle ensures that systems remain accessible and operational? a) Confidentiality b) Integrity c) Availability d) Authorization 9) Which of the following is an example of Detection in the DAD model? a) A firewall blocking an attack b) A security guard seeing a camera recording of an intruder c) A user being denied access to a system d) A DDoS attack bringing down a website 10) In the AAA model, Accounting refers to: a) Tracking user activities and resource usage b) Verifying user identities c) Granting permissions based on policies d) Encrypting sensitive data

Leaderboard

Visual style

Options

Switch template

Continue editing: ?