Information Cyber Security Set 10
On This Page
This set of Information Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information Cyber Security Set 10
Q1 | Transport layer Protocol consists of ... main components
- 2
- 1
- 3
- 4
Q2 | length of the IPv6 acddress is ....
- 32 bits
- 64 bits
- 16 bits
- 128 bit
Q3 | IPSec provides ....protocols for network layer
- 7
- 3
- 1
- 4
Q4 | length of the IPv6 header is....
- 64 bits
- 16 bits
- 32 bits
- 8 bits
Q5 | CIA triad is also known as
- nic (non-repudiation, integrity, confidentiality)
- aic (availability, integrity, confidentiality)
- ain (availability, integrity, non-repudiation)
- aic (authenticity, integrity, confidentiality)
Q6 | of information means, only authorised users are capable of accessing the information.
- confidentiality
- integrity
- non-repudiation
- availability
Q7 | means the protection of data from modification by unknown users.
- confidentiality
- integrity
- authentication
- non-repudiation
Q8 | When you use the word it means you are protecting your data from getting disclosed.
- confidentiality
- integrity
- authentication
- availability
Q9 | When integrity is lacking in a security system, occurs.
- database hacking
- data deletion
- data tampering
- data leakage
Q10 | Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?
- they help understanding hacking better
- they are key elements to a security breach
- they help understands security and its components better
- they help to understand the cyber-crime better
Q11 | This helps in identifying the origin of information and authentic user. This referred to here as
- confidentiality
- integrity
- authenticity
- availability
Q12 | Data is used to ensure confidentiality.
- encryption
- locking
- deleting
- backup
Q13 | Data integrity gets compromised when and are taken control off.
- access control, file deletion
- network, file permission
- access control, file permission
- network, system
Q14 | is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.
- network security
- database security
- information security
- physical security
Q15 | From the options below, which of them is not a threat to information security?
- disaster
- eavesdropping
- information leakage
- unchanged default password
Q16 | Compromising confidential information comes under
- bug
- threat
- vulnerability
- attack
Q17 | The full form of OSI is OSI model is
- open systems interconnection
- open software interconnection
- open systems internet
- open software internet
Q18 | In layer, vulnerabilities are directly associated with physical access to networks and hardware.
- physical
- data-link
- network
- application
Q19 | If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:
- release of message content-passive attack
- traffic analysis -passive attacks
- release of message content- active attacks
- traffic analysis -active attacks
Q20 | If communication between 2 people is overheard by a third person without extraction of any data, it is called as:
- release of message content-passive attack
- traffic analysis -passive attacks
- release of message content- active attacks
- traffic analysis -active attacks
Q21 | The information that gets transformed in encryption is
- plain text
- parallel text
- encrypted text
- decrypted text
Q22 | A unique piece of information that is used in encryption.
- cipher
- plain text
- key
- cipher
Q23 | Study of creating a d using encryption and decryption techniques.
- cipher
- cryptography
- encryption
- decryption
Q24 | An attack in which the user receives unwanted amount of e- mails.
- smurfing
- denial of service
- e-mail bombing
- ping storm
Q25 | In same keys are implemented for encrypting as well as decrypting the information.
- symmetric key encryption
- asymmetric key encryption
- asymmetric key decryption
- hash-based key encryption