CIA Triad and Control Type Match
Match foundational security requirements to the correct CIA-triad or control-type answer.
Objective-level PBQ and simulation practice across all Security+ domains.
Total Attempts
0
Average Accuracy
0%
Weak Area Focus
Match foundational security requirements to the correct CIA-triad or control-type answer.
Work through scenario decisions around security objectives, control types, and basic risk language.
Place core control roles into the right prevention, detection, and response zones.
Order the reasoning path from requirement, to risk, to the correct security objective and control choice.
Match governance statements to the correct policy-document type.
Choose the best governance answer for policy, standard, and framework questions.
Place policy and governance functions into the right operational roles.
Order the process for drafting, approving, and enforcing governance documents.
Match hashing, encryption, and certificate requirements to the correct cryptographic answer.
Work through security scenarios requiring the right cryptographic primitive or trust answer.
Place encryption, integrity, and trust components into the right security roles.
Order the steps used to apply cryptographic protection and trust validation.
Match identity and access requirements to the correct authentication or authorization answer.
Choose the correct identity-control decision for common access management scenarios.
Place identity, authorization, and verification controls into the correct security roles.
Order the steps required to verify identity and enforce least privilege.
Match training requirements to the correct user-awareness and reporting control.
Choose the best awareness-program answer for phishing, reporting, and user-risk scenarios.
Place reporting and awareness controls into the right user-risk reduction roles.
Order the correct user and analyst response to a suspected phishing event.
Match physical security requirements to the correct access or monitoring control.
Choose the right physical security answer for entry-control and monitoring scenarios.
Place entry, monitoring, and restricted-area controls into the right facility zones.
Order the process used to verify personnel and control access into a protected area.
Complete at least one attempt to unlock recommendations.