Top 250+ Solved Information Cyber Security (ICS) MCQ Questions Answer

From 31 to 45 of 239

Q.                of information means, only authorised users are capable of accessing the information.

a. confidentiality

b. integrity

c. non-repudiation

d. availability

  • a. confidentiality

Q.              means the protection of data from modification by unknown users.

a. confidentiality

b. integrity

c. authentication

d. non-repudiation

  • b. integrity

Q. When you use the word it means you are protecting your data from getting disclosed.

a. confidentiality

b. integrity

c. authentication

d. availability

  • a. confidentiality

Q. When integrity is lacking in a security system,                     occurs.

a. database hacking

b. data deletion

c. data tampering

d. data leakage

  • c. data tampering

Q. Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?

a. they help understanding hacking better

b. they are key elements to a security breach

c. they help understands security and its components better

d. they help to understand the cyber-crime better

  • c. they help understands security and its components better

Q. Data is used to ensure confidentiality.

a. encryption

b. locking

c. deleting

d. backup

  • a. encryption

Q. Data integrity gets compromised when and are taken control off.

a. access control, file deletion

b. network, file permission

c. access control, file permission

d. network, system

  • c. access control, file permission

Q.                is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

a. network security

b. database security

c. information security

d. physical security

  • c. information security

Q. From the options below, which of them is not a threat to information security?

a. disaster

b. eavesdropping

c. information leakage

d. unchanged default password

  • d. unchanged default password

Q. Compromising confidential information comes under                    

a. bug

b. threat

c. vulnerability

d. attack

  • b. threat

Q. The full form of OSI is OSI model is                              

a. open systems interconnection

b. open software interconnection

c. open systems internet

d. open software internet

  • a. open systems interconnection

Q. In layer, vulnerabilities are directly associated with physical access to networks and hardware.

a. physical

b. data-link

c. network

d. application

  • a. physical

Q. If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:

a. release of message content-passive attack

b. traffic analysis -passive attacks

c. release of message content- active attacks

d. traffic analysis -active attacks

  • a. release of message content-passive attack

Q. If communication between 2 people is overheard by a third person without extraction of any data, it is called as:

a. release of message content-passive attack

b. traffic analysis -passive attacks

c. release of message content- active attacks

d. traffic analysis -active attacks

  • d. traffic analysis -active attacks
Subscribe Now

Get All Updates & News