Top 80+ Solved Information and Cyber Security (ICS) MCQ Questions Answer

From 46 to 60 of 70

Q. The full form of OSI is OSI model is                              

a. open systems interconnection

b. open software interconnection

c. open systems internet

d. open software internet

  • a. open systems interconnection

Q. In layer, vulnerabilities are directly associated with physical access to networks and hardware.

a. physical

b. data-link

c. network

d. application

  • a. physical

Q. Which of the following attack can actively modify communications or data?

a. both active and passive attacks

b. neither active and passive attacks

c. active attacks

d. passive attacks

  • c. active attacks

Q. 3) Categories of Security Service

a. 1

b. 1 &3

c. 2& 3

d. 1,2,3

  • d. 1,2,3

Q. Release of Message Content and Traffic analysis are type of :

a. both active and passive attacks

b. neither active and passive attacks

c. active attacks

d. passive attacks

  • d. passive attacks

Q. If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:

a. release of message content-passive attack

b. traffic analysis -passive attacks

c. release of message content- active attacks

d. traffic analysis -active attacks

  • a. release of message content-passive attack

Q. If communication between 2 people is overheard by a third person without extraction of any data, it is called as:

a. release of message content-passive attack

b. traffic analysis -passive attacks

c. release of message content- active attacks

d. traffic analysis -active attacks

  • d. traffic analysis -active attacks

Q.              means when an attacker pretends to be authentic user

a. masquerade

b. replay

c. modification

d. traffic analysis

  • a. masquerade

Q.                        attack is when original data is modified and malicious data is inserted

a. masquerade

b. replay(rewrite)

c. modification

d. traffic analysis

  • b. replay(rewrite)

Q. When original data is changed to make it non-meaningful by attacker it is known as

a. masquerade

b. replay

c. modification of messages

d. traffic analysis

  • c. modification of messages

Q. Which is the type of attack when Network is made unavailable for user

a. masquerade

b. replay

c. modification

d. denial of service

  • d. denial of service

Q. Modification of Data is done in:

a. both active and passive attacks

b. neither active and passive attacks

c. active attacks

d. passive attacks

  • a. both active and passive attacks

Q. The information that gets transformed in encryption is

a. plain text

b. parallel text

c. encrypted text

d. decrypted text

  • a. plain text

Q. A process of making the encrypted text readable again.

a. decryption

b. encryption

c. network security

d. information hiding

  • a. decryption

Q. A unique piece of information that is used in encryption.

a. cipher

b. plain text

c. key

d. cipher

  • c. key
Subscribe Now

Get All Updates & News