Top 250+ Solved Information Cyber Security (ICS) MCQ Questions Answer
Q. of information means, only authorised users are capable of accessing the information.
a. confidentiality
b. integrity
c. non-repudiation
d. availability
Q. means the protection of data from modification by unknown users.
a. confidentiality
b. integrity
c. authentication
d. non-repudiation
Q. When you use the word it means you are protecting your data from getting disclosed.
a. confidentiality
b. integrity
c. authentication
d. availability
Q. When integrity is lacking in a security system, occurs.
a. database hacking
b. data deletion
c. data tampering
d. data leakage
Q. Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?
a. they help understanding hacking better
b. they are key elements to a security breach
c. they help understands security and its components better
d. they help to understand the cyber-crime better
Q. This helps in identifying the origin of information and authentic user. This referred to here as
a. confidentiality
b. integrity
c. authenticity
d. availability
Q. Data integrity gets compromised when and are taken control off.
a. access control, file deletion
b. network, file permission
c. access control, file permission
d. network, system
Q. is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.
a. network security
b. database security
c. information security
d. physical security
Q. From the options below, which of them is not a threat to information security?
a. disaster
b. eavesdropping
c. information leakage
d. unchanged default password
Q. The full form of OSI is OSI model is
a. open systems interconnection
b. open software interconnection
c. open systems internet
d. open software internet
Q. In layer, vulnerabilities are directly associated with physical access to networks and hardware.
a. physical
b. data-link
c. network
d. application
Q. If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:
a. release of message content-passive attack
b. traffic analysis -passive attacks
c. release of message content- active attacks
d. traffic analysis -active attacks
Q. If communication between 2 people is overheard by a third person without extraction of any data, it is called as:
a. release of message content-passive attack
b. traffic analysis -passive attacks
c. release of message content- active attacks
d. traffic analysis -active attacks