On This Page

This set of Information Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information Cyber Security Set 10

Q1 | Transport layer Protocol consists of ... main components
  • 2
  • 1
  • 3
  • 4
Q2 | length of the IPv6 acddress is ....
  • 32 bits
  • 64 bits
  • 16 bits
  • 128 bit
Q3 | IPSec provides ....protocols for network layer
  • 7
  • 3
  • 1
  • 4
Q4 | length of the IPv6 header is....
  • 64 bits
  • 16 bits
  • 32 bits
  • 8 bits
Q5 | CIA triad is also known as                  
  • nic (non-repudiation, integrity, confidentiality)
  • aic (availability, integrity, confidentiality)
  • ain (availability, integrity, non-repudiation)
  • aic (authenticity, integrity, confidentiality)
Q6 |                of information means, only authorised users are capable of accessing the information.
  • confidentiality
  • integrity
  • non-repudiation
  • availability
Q7 |              means the protection of data from modification by unknown users.
  • confidentiality
  • integrity
  • authentication
  • non-repudiation
Q8 | When you use the word it means you are protecting your data from getting disclosed.
  • confidentiality
  • integrity
  • authentication
  • availability
Q9 | When integrity is lacking in a security system,                     occurs.
  • database hacking
  • data deletion
  • data tampering
  • data leakage
Q10 | Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?
  • they help understanding hacking better
  • they are key elements to a security breach
  • they help understands security and its components better
  • they help to understand the cyber-crime better
Q11 | This helps in identifying the origin of information and authentic user. This referred to here as                      
  • confidentiality
  • integrity
  • authenticity
  • availability
Q12 | Data is used to ensure confidentiality.
  • encryption
  • locking
  • deleting
  • backup
Q13 | Data integrity gets compromised when and are taken control off.
  • access control, file deletion
  • network, file permission
  • access control, file permission
  • network, system
Q14 |                is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.
  • network security
  • database security
  • information security
  • physical security
Q15 | From the options below, which of them is not a threat to information security?
  • disaster
  • eavesdropping
  • information leakage
  • unchanged default password
Q16 | Compromising confidential information comes under                    
  • bug
  • threat
  • vulnerability
  • attack
Q17 | The full form of OSI is OSI model is                              
  • open systems interconnection
  • open software interconnection
  • open systems internet
  • open software internet
Q18 | In layer, vulnerabilities are directly associated with physical access to networks and hardware.
  • physical
  • data-link
  • network
  • application
Q19 | If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:
  • release of message content-passive attack
  • traffic analysis -passive attacks
  • release of message content- active attacks
  • traffic analysis -active attacks
Q20 | If communication between 2 people is overheard by a third person without extraction of any data, it is called as:
  • release of message content-passive attack
  • traffic analysis -passive attacks
  • release of message content- active attacks
  • traffic analysis -active attacks
Q21 | The information that gets transformed in encryption is
  • plain text
  • parallel text
  • encrypted text
  • decrypted text
Q22 | A unique piece of information that is used in encryption.
  • cipher
  • plain text
  • key
  • cipher
Q23 | Study of creating a d using encryption and decryption techniques.
  • cipher
  • cryptography
  • encryption
  • decryption
Q24 | An attack in which the user receives unwanted amount of e- mails.
  • smurfing
  • denial of service
  • e-mail bombing
  • ping storm
Q25 | In same keys are implemented for encrypting as well as decrypting the information.
  • symmetric key encryption
  • asymmetric key encryption
  • asymmetric key decryption
  • hash-based key encryption