Information Cyber Security (ICS) Solved MCQs

Computer security, cybersecurity or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide

226.

Transport layer Protocol consists of ... main components

A. 2
B. 1
C. 3
D. 4
Answer» A. 2
227.

length of the IPv6 acddress is ....

A. 32 bits
B. 64 bits
C. 16 bits
D. 128 bit
Answer» D. 128 bit
228.

IPSec provides ....protocols for network layer

A. 7
B. 3
C. 1
D. 4
Answer» A. 7
229.

length of the IPv6 header is....

A. 64 bits
B. 16 bits
C. 32 bits
D. 8 bits
Answer» C. 32 bits
230.

CIA triad is also known as                  

A. nic (non-repudiation, integrity, confidentiality)
B. aic (availability, integrity, confidentiality)
C. ain (availability, integrity, non-repudiation)
D. aic (authenticity, integrity, confidentiality)
Answer» B. aic (availability, integrity, confidentiality)
231.

               of information means, only authorised users are capable of accessing the information.

A. confidentiality
B. integrity
C. non-repudiation
D. availability
Answer» A. confidentiality
232.

             means the protection of data from modification by unknown users.

A. confidentiality
B. integrity
C. authentication
D. non-repudiation
Answer» B. integrity
233.

When you use the word it means you are protecting your data from getting disclosed.

A. confidentiality
B. integrity
C. authentication
D. availability
Answer» A. confidentiality
234.

When integrity is lacking in a security system,                     occurs.

A. database hacking
B. data deletion
C. data tampering
D. data leakage
Answer» C. data tampering
235.

Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?

A. they help understanding hacking better
B. they are key elements to a security breach
C. they help understands security and its components better
D. they help to understand the cyber-crime better
Answer» C. they help understands security and its components better
236.

This helps in identifying the origin of information and authentic user. This referred to here as                      

A. confidentiality
B. integrity
C. authenticity
D. availability
Answer» C. authenticity
237.

Data is used to ensure confidentiality.

A. encryption
B. locking
C. deleting
D. backup
Answer» A. encryption
238.

Data integrity gets compromised when and are taken control off.

A. access control, file deletion
B. network, file permission
C. access control, file permission
D. network, system
Answer» C. access control, file permission
239.

               is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

A. network security
B. database security
C. information security
D. physical security
Answer» C. information security
240.

From the options below, which of them is not a threat to information security?

A. disaster
B. eavesdropping
C. information leakage
D. unchanged default password
Answer» D. unchanged default password
241.

Compromising confidential information comes under                    

A. bug
B. threat
C. vulnerability
D. attack
Answer» B. threat
242.

The full form of OSI is OSI model is                              

A. open systems interconnection
B. open software interconnection
C. open systems internet
D. open software internet
Answer» A. open systems interconnection
243.

In layer, vulnerabilities are directly associated with physical access to networks and hardware.

A. physical
B. data-link
C. network
D. application
Answer» A. physical
244.

If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:

A. release of message content-passive attack
B. traffic analysis -passive attacks
C. release of message content- active attacks
D. traffic analysis -active attacks
Answer» A. release of message content-passive attack
245.

If communication between 2 people is overheard by a third person without extraction of any data, it is called as:

A. release of message content-passive attack
B. traffic analysis -passive attacks
C. release of message content- active attacks
D. traffic analysis -active attacks
Answer» D. traffic analysis -active attacks
246.

The information that gets transformed in encryption is

A. plain text
B. parallel text
C. encrypted text
D. decrypted text
Answer» A. plain text
247.

A unique piece of information that is used in encryption.

A. cipher
B. plain text
C. key
D. cipher
Answer» C. key
248.

Study of creating a d using encryption and decryption techniques.

A. cipher
B. cryptography
C. encryption
D. decryption
Answer» B. cryptography
249.

An attack in which the user receives unwanted amount of e- mails.

A. smurfing
B. denial of service
C. e-mail bombing
D. ping storm
Answer» C. e-mail bombing
250.

In same keys are implemented for encrypting as well as decrypting the information.

A. symmetric key encryption
B. asymmetric key encryption
C. asymmetric key decryption
D. hash-based key encryption
Answer» A. symmetric key encryption
Tags
Question and answers in Information Cyber Security (ICS), Information Cyber Security (ICS) multiple choice questions and answers, Information Cyber Security (ICS) Important MCQs, Solved MCQs for Information Cyber Security (ICS), Information Cyber Security (ICS) MCQs with answers PDF download

Help us improve!

We want to make our service better for you. Please take a moment to fill out our survey.

Take Survey