Information Cyber Security MCQs and Notes

P

Praveen Singh • 36.71K Points
Coach

Q 281. The ________ is encrypted text.

(A) cipher scricpt
(B) cipher text
(C) secret text
(D) secret script

S

Shiva Ram • 30.44K Points
Instructor I

Q 282. Release of message contents and Traffic analysis are two types of _________ attacks.

(A) active attack
(B) modification of attack
(C) passive attack
(D) dos attack

R

Ram Sharma • 193.84K Points
Coach

Q 283. A company requires its users to change passwords every month. This improves the ________ of the network.

(A) performance
(B) reliability
(C) security
(D) none of the above

P

Praveen Singh • 36.71K Points
Coach

Q 284. What does OSI stand for in the OSI Security Architecure?

(A) open system interface
(B) open systems interconnections
(C) open source initiative
(D) open standard interconnections

V

Vijay Sangwan • 28.62K Points
Instructor II

Q 285. Data ___________ is used to ensure confidentiality.

(A) encryption
(B) locking
(C) decryption
(D) backup

A

Admin • 36.93K Points
Coach

Q 286. This helps in identifying the origin of information and authentic user. This referred to here as __________

(A) confidentiality
(B) integrity
(C) authenticity
(D) availability

R

Ranjeet • 34.60K Points
Instructor I

Q 287. _______ of information means, only authorized users are capable of accessing the information.

(A) confidentiality
(B) integrity
(C) non-repudiation
(D) availability

P

Praveen Singh • 36.71K Points
Coach

Q 288. _______ means the protection of data from modification by unknown users.

(A) confidentiality
(B) integrity
(C) authentication
(D) non-repudiation

R

Rakesh Kumar • 28.44K Points
Instructor II

Q 289. When you use the word ______it means you are protecting your data from getting disclosed.

(A) confidentiality
(B) integrity
(C) authentication
(D) availability

Download our easy to use, user friendly Android App from Play Store. And learn MCQs with one click.

Image