Information Cyber Security MCQs and Notes
P
Q 281. The ________ is encrypted text.
S
Q 282. Release of message contents and Traffic analysis are two types of _________ attacks.
R
Q 283. A company requires its users to change passwords every month. This improves the ________ of the network.
P
Q 284. What does OSI stand for in the OSI Security Architecure?
V
Q 285. Data ___________ is used to ensure confidentiality.
A
Q 286. This helps in identifying the origin of information and authentic user. This referred to here as __________
R
Q 287. _______ of information means, only authorized users are capable of accessing the information.
P
Q 288. _______ means the protection of data from modification by unknown users.
R