Top 350+ Solved Ubiquitous Computing System (UCS) MCQ Questions Answer
Q. is what every individual prefer in terms of physical privacy as well as digital privacy.
a. Confidentiality
b. Integrity
c. Authentication
d. Availability
Q. means the protection of data from modification by unknown users.
a. Confidentiality
b. Integrity
c. Authentication
d. Availability
Q. of information means, only authorised users are capable of accessing the information.
a. Confidentiality
b. Integrity
c. Authentication
d. Availability
Q. This helps in identifying the origin of information and
a. Confidentiality
b. Integrity
c. Authentication
d. Availability
Q. One common way to maintain data availability is
a. Data Clustering
b. Data backup
c. Data Altering
d. Data recovery
Q. The First Phase Of Hacking An IT System Is Compromise Of W hich Foundation Of Security?
a. Confidentiality
b. Integrity
c. Authentication
d. Availability
Q. Data integrity means
a. providing first access to stored data
b. ensuring correctness and consistency of
c. providing data sharing
d. none of the above
Q. Authentication refers to :
a. methods ofrestricting user access to system
b. controllingaccess to portions of
c. controlling theoperation on the data
d. all of the above
Q. is proving that a message was sent by a certain sender.
a. Confidentiality
b. Integrity
c. Authentication
d. Availability
Q. means hiding contents of a message so that nobody else but the intended recipient can read it.
a. Authenticity
b. Integrity
c. Encryption
d. Availability
Q. is the act of taking data and rendering it unreadable to anyone except for the intended recipient. While on the other hand, is the act of a user proving that they are who they are, and that they can
a. Encryption, Decryption
b. Encryption, Availability
c. Authentication, Encryption
d. Encryption, Authentication
Q. ensures no one other our intended recipient(s) can eavesdrop on the message while provides confidentiality by scrambling the
a. Encryption, Decryption
b. Encryption, Availability
c. Authentication, Encryption
d. Confidentiality, Encryption
Q. ensures no one can alter the message before our intended recipient(s) sees it.
a. Authenticity
b. Integrity
c. Encryption
d. Availability