Top 350+ Solved Ubiquitous Computing System (UCS) MCQ Questions Answer

From 301 to 315 of 349

Q.                    is what every individual prefer in terms of physical privacy as well as digital privacy.

a. Confidentiality

b. Integrity

c. Authentication

d. Availability

  • a. Confidentiality

Q.              means the protection of data from modification by unknown users.

a. Confidentiality

b. Integrity

c. Authentication

d. Availability

  • b. Integrity

Q. of information means, only authorised users are capable of accessing the information.

a. Confidentiality

b. Integrity

c. Authentication

d. Availability

  • d. Availability

Q. This helps in identifying the origin of information and

a. Confidentiality

b. Integrity

c. Authentication

d. Availability

  • c. Authentication

Q. Data is used to ensure confidentiality.

a. Encryption

b. Locking

c. Deleting

d. Backup

  • a. Encryption

Q. One common way to maintain data availability is

a. Data Clustering

b. Data backup

c. Data Altering

d. Data recovery

  • b. Data backup

Q. The First Phase Of Hacking An IT System Is Compromise   Of W hich Foundation Of Security?

a. Confidentiality

b. Integrity

c. Authentication

d. Availability

  • a. Confidentiality

Q. Data integrity means

a. providing first access to stored data

b. ensuring correctness and consistency of

c. providing data sharing

d. none of the above

  • b. ensuring correctness and consistency of

Q. Authentication refers to :

a. methods ofrestricting user access to system

b. controllingaccess to portions of

c. controlling theoperation on the data

d. all of the above

  • d. all of the above

Q.                                        does not have any management flow.

a. Synchronous

b. Casual

c. Asynchronous

d. Smart Interaction

  • c. Asynchronous

Q. is proving that a message was sent by a certain sender.

a. Confidentiality

b. Integrity

c. Authentication

d. Availability

  • c. Authentication

Q. means hiding contents of a message so that nobody else but the intended recipient can read it.

a. Authenticity

b. Integrity

c. Encryption

d. Availability

  • c. Encryption

Q. ensures no one can alter the message before our intended recipient(s) sees it.

a. Authenticity

b. Integrity

c. Encryption

d. Availability

  • b. Integrity
Subscribe Now

Get All Updates & News