Top 250+ Solved Information Cyber Security (ICS) MCQ Questions Answer

From 151 to 165 of 239

Q. AES stands for ?

a. authorized encryption standard

b. advance encryption standard

c. advance encryption strategy

d. none of these

  • b. advance encryption standard

Q. Which of them is type of Cipher?

a. stream cipher

b. block cipher

c. both of them

d. none of these

  • c. both of them

Q. The message which is not understandable is called as?

a. cipher text

b. plain text

c. hidden text

d. both a & c

  • a. cipher text

Q. _______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction.

a. a) network security

b. b) database security

c. c) information security

d. d) physical security

  • c. c) information security

Q. _______ platforms are used for safety and protection of information in the cloud.

a. a) cloud workload protection platforms

b. b) cloud security protocols

c. c) aws

d. d) one drive

  • a. a) cloud workload protection platforms

Q. Compromising confidential information comes under _________

a. a) bug

b. b) threat

c. c) vulnerability

d. d) attack

  • b. b) threat

Q. An attempt to harm, damage or cause threat to a system or network is broadly termed as ______

a. a) cyber-crime

b. b) cyber attack

c. c) system hijacking

d. d) digital crime

  • b. b) cyber attack

Q. The CIA triad is often represented by which of the following?

a. a) triangle

b. b) diagonal

c. c) ellipse

d. d) circle

  • a. a) triangle

Q. Related to information security, confidentiality is the opposite of which of the following?

a. a) closure

b. b) disclosure

c. c) disaster

d. d) disposal

  • b. b) disclosure

Q. When you use the word ______it means you are protecting your data from getting disclosed.

a. a) confidentiality

b. b) integrity

c. c) authentication

d. d) availability

  • a. a) confidentiality

Q. _______ means the protection of data from modification by unknown users.

a. a) confidentiality

b. b) integrity

c. c) authentication

d. d) non-repudiation

  • b. b) integrity

Q. _______ of information means, only authorized users are capable of accessing the information.

a. a) confidentiality

b. b) integrity

c. c) non-repudiation

d. d) availability

  • d. d) availability

Q. This helps in identifying the origin of information and authentic user. This referred to here as __________

a. a) confidentiality

b. b) integrity

c. c) authenticity

d. d) availability

  • c. c) authenticity

Q. Data ___________ is used to ensure confidentiality.

a. a) encryption

b. b) locking

c. c) decryption

d. d) backup

  • a. a) encryption

Q. What does OSI stand for in the OSI Security Architecure?

a. a) open system interface

b. b) open systems interconnections

c. c) open source initiative

d. d) open standard interconnections

  • b. b) open systems interconnections
Subscribe Now

Get All Updates & News