Home / Engineering / Information Cyber Security (ICS) MCQs / Page 6

Information Cyber Security (ICS) MCQs | Page - 6

Dear candidates you will find MCQ questions of Information Cyber Security (ICS) here. Learn these questions and prepare yourself for coming examinations and interviews. You can check the right answer of any question by clicking on any option or by clicking view answer button.

M

Mr. Dubey • 51.43K Points
Coach

Q. 51) When you use the word ______it means you are protecting your data from getting disclosed.

(A) confidentiality
(B) integrity
(C) authentication
(D) availability
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 52) _______ means the protection of data from modification by unknown users.

(A) confidentiality
(B) integrity
(C) authentication
(D) non-repudiation
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 53) _______ of information means, only authorized users are capable of accessing the information.

(A) confidentiality
(B) integrity
(C) non-repudiation
(D) availability
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 54) This helps in identifying the origin of information and authentic user. This referred to here as __________

(A) confidentiality
(B) integrity
(C) authenticity
(D) availability
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 55) Data ___________ is used to ensure confidentiality.

(A) encryption
(B) locking
(C) decryption
(D) backup
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 56) What does OSI stand for in the OSI Security Architecure?

(A) open system interface
(B) open systems interconnections
(C) open source initiative
(D) open standard interconnections
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 57) A company requires its users to change passwords every month. This improves the ________ of the network.

(A) performance
(B) reliability
(C) security
(D) none of the above
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 58) Release of message contents and Traffic analysis are two types of _________ attacks.

(A) active attack
(B) modification of attack
(C) passive attack
(D) dos attack
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 59) The ________ is encrypted text.

(A) cipher scricpt
(B) cipher text
(C) secret text
(D) secret script
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 60) What type of attack uses a fraudulent server with a relay address?

(A) ntlm
(B) mitm
(C) netbios
(D) smb
View Answer Discuss Share