Top 80+ Solved Information and Cyber Security (ICS) MCQ Questions Answer
Q. The full form of OSI is OSI model is
a. open systems interconnection
b. open software interconnection
c. open systems internet
d. open software internet
Q. In layer, vulnerabilities are directly associated with physical access to networks and hardware.
a. physical
b. data-link
c. network
d. application
Q. Which of the following attack can actively modify communications or data?
a. both active and passive attacks
b. neither active and passive attacks
c. active attacks
d. passive attacks
Q. Release of Message Content and Traffic analysis are type of :
a. both active and passive attacks
b. neither active and passive attacks
c. active attacks
d. passive attacks
Q. If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:
a. release of message content-passive attack
b. traffic analysis -passive attacks
c. release of message content- active attacks
d. traffic analysis -active attacks
Q. If communication between 2 people is overheard by a third person without extraction of any data, it is called as:
a. release of message content-passive attack
b. traffic analysis -passive attacks
c. release of message content- active attacks
d. traffic analysis -active attacks
Q. means when an attacker pretends to be authentic user
a. masquerade
b. replay
c. modification
d. traffic analysis
Q. attack is when original data is modified and malicious data is inserted
a. masquerade
b. replay(rewrite)
c. modification
d. traffic analysis
Q. When original data is changed to make it non-meaningful by attacker it is known as
a. masquerade
b. replay
c. modification of messages
d. traffic analysis
Q. Which is the type of attack when Network is made unavailable for user
a. masquerade
b. replay
c. modification
d. denial of service
Q. Modification of Data is done in:
a. both active and passive attacks
b. neither active and passive attacks
c. active attacks
d. passive attacks
Q. The information that gets transformed in encryption is
a. plain text
b. parallel text
c. encrypted text
d. decrypted text
Q. A process of making the encrypted text readable again.
a. decryption
b. encryption
c. network security
d. information hiding
Q. A unique piece of information that is used in encryption.
a. cipher
b. plain text
c. key
d. cipher