Top 80+ Solved Information and Cyber Security (ICS) MCQ Questions Answer

From 1 to 15 of 70

Q. Security Measures Needed to protect during their transmission

a. file

b. data

c. packet

d. all of above

  • b. data

Q. Prevention of the unauthorised used of Resources refers too?

a. data integrity

b. data confidentiality

c. acess control

d. none of these

  • c. acess control

Q. Protection against Denial by one of these parties in a communication refers to?

a. non-repudiation

b. data integrity

c. authentication

d. none of these

  • a. non-repudiation

Q. Which One of them is Passive attack?

a. denial of service

b. modify message intransit

c. replay previous message

d. obtain message contain

  • d. obtain message contain

Q. What is lying of IP address called as?

a. ip spoofing

b. ip scamming

c. ip lying

d. none of theses

  • a. ip spoofing

Q. What is full form of DDoS?

a. derived denial of service

b. distributed denial ofservice

c. denial of service

d. none of these

  • b. distributed denial ofservice

Q. A hacker guessing suggested password to a program is call as?

a. password guessing

b. dictionary attack

c. default password attack

d. none of these

  • c. default password attack

Q. Symmetric key encryption is also called as?

a. public key encryption

b. private keyencryption

c. both of these

d. none of these

  • b. private keyencryption

Q. Conversion of Cypher text to plain text?

a. encryption

b. decryption

c. simple text

d. none of these

  • b. decryption

Q.     is used to create the organisation's overall security program.

a. program policy

b. purpose

c. security

d. none of these

  • a. program policy

Q. An act of protecting information from unauthorised disclouser to an entity.-

a. intergrity

b. avability

c. confidentiality

d. none of these

  • c. confidentiality

Q. A way to ensure that the entity is indeed what it claims to be.-

a. authentication

b. accountability

c. identification

d. security

  • a. authentication

Q. The full form of OSI is OSI model .

a. open systemsinterconnection

b. open softwareinterconnection

c. open connection

d. open system internet

  • a. open systemsinterconnection
Subscribe Now

Get All Updates & News