Computer security, cybersecurity or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide
226. |
Transport layer Protocol consists of ... main components |
A. | 2 |
B. | 1 |
C. | 3 |
D. | 4 |
Answer» A. 2 |
227. |
length of the IPv6 acddress is .... |
A. | 32 bits |
B. | 64 bits |
C. | 16 bits |
D. | 128 bit |
Answer» D. 128 bit |
228. |
IPSec provides ....protocols for network layer |
A. | 7 |
B. | 3 |
C. | 1 |
D. | 4 |
Answer» A. 7 |
229. |
length of the IPv6 header is.... |
A. | 64 bits |
B. | 16 bits |
C. | 32 bits |
D. | 8 bits |
Answer» C. 32 bits |
230. |
CIA triad is also known as |
A. | nic (non-repudiation, integrity, confidentiality) |
B. | aic (availability, integrity, confidentiality) |
C. | ain (availability, integrity, non-repudiation) |
D. | aic (authenticity, integrity, confidentiality) |
Answer» B. aic (availability, integrity, confidentiality) |
231. |
of information means, only authorised users are capable of accessing the information. |
A. | confidentiality |
B. | integrity |
C. | non-repudiation |
D. | availability |
Answer» A. confidentiality |
232. |
means the protection of data from modification by unknown users. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | non-repudiation |
Answer» B. integrity |
233. |
When you use the word it means you are protecting your data from getting disclosed. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | availability |
Answer» A. confidentiality |
234. |
When integrity is lacking in a security system, occurs. |
A. | database hacking |
B. | data deletion |
C. | data tampering |
D. | data leakage |
Answer» C. data tampering |
235. |
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental? |
A. | they help understanding hacking better |
B. | they are key elements to a security breach |
C. | they help understands security and its components better |
D. | they help to understand the cyber-crime better |
Answer» C. they help understands security and its components better |
236. |
This helps in identifying the origin of information and authentic user. This referred to here as |
A. | confidentiality |
B. | integrity |
C. | authenticity |
D. | availability |
Answer» C. authenticity |
237. |
Data is used to ensure confidentiality. |
A. | encryption |
B. | locking |
C. | deleting |
D. | backup |
Answer» A. encryption |
238. |
Data integrity gets compromised when and are taken control off. |
A. | access control, file deletion |
B. | network, file permission |
C. | access control, file permission |
D. | network, system |
Answer» C. access control, file permission |
239. |
is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction. |
A. | network security |
B. | database security |
C. | information security |
D. | physical security |
Answer» C. information security |
240. |
From the options below, which of them is not a threat to information security? |
A. | disaster |
B. | eavesdropping |
C. | information leakage |
D. | unchanged default password |
Answer» D. unchanged default password |
241. |
Compromising confidential information comes under |
A. | bug |
B. | threat |
C. | vulnerability |
D. | attack |
Answer» B. threat |
242. |
The full form of OSI is OSI model is |
A. | open systems interconnection |
B. | open software interconnection |
C. | open systems internet |
D. | open software internet |
Answer» A. open systems interconnection |
243. |
In layer, vulnerabilities are directly associated with physical access to networks and hardware. |
A. | physical |
B. | data-link |
C. | network |
D. | application |
Answer» A. physical |
244. |
If communication between 2 people is overheard by a third person without manipulation of any data, it is called as: |
A. | release of message content-passive attack |
B. | traffic analysis -passive attacks |
C. | release of message content- active attacks |
D. | traffic analysis -active attacks |
Answer» A. release of message content-passive attack |
245. |
If communication between 2 people is overheard by a third person without extraction of any data, it is called as: |
A. | release of message content-passive attack |
B. | traffic analysis -passive attacks |
C. | release of message content- active attacks |
D. | traffic analysis -active attacks |
Answer» D. traffic analysis -active attacks |
246. |
The information that gets transformed in encryption is |
A. | plain text |
B. | parallel text |
C. | encrypted text |
D. | decrypted text |
Answer» A. plain text |
247. |
A unique piece of information that is used in encryption. |
A. | cipher |
B. | plain text |
C. | key |
D. | cipher |
Answer» C. key |
248. |
Study of creating a d using encryption and decryption techniques. |
A. | cipher |
B. | cryptography |
C. | encryption |
D. | decryption |
Answer» B. cryptography |
249. |
An attack in which the user receives unwanted amount of e- mails. |
A. | smurfing |
B. | denial of service |
C. | e-mail bombing |
D. | ping storm |
Answer» C. e-mail bombing |
250. |
In same keys are implemented for encrypting as well as decrypting the information. |
A. | symmetric key encryption |
B. | asymmetric key encryption |
C. | asymmetric key decryption |
D. | hash-based key encryption |
Answer» A. symmetric key encryption |
We want to make our service better for you. Please take a moment to fill out our survey.
Take Survey