Ubiquitous Computing System Set 8
On This Page
This set of Ubiquitous Computing System UCS Multiple Choice Questions & Answers (MCQs) focuses on Ubiquitous Computing System Set 8
Q1 | When you use the word it means you are protecting your data from getting disclosed.
- Confidentiality
- Integrity
- Authentication
- Availability
Q2 | is what every individual prefer in terms of physical privacy as well as digital privacy.
- Confidentiality
- Integrity
- Authentication
- Availability
Q3 | means the protection of data from modification by unknown users.
- Confidentiality
- Integrity
- Authentication
- Availability
Q4 | of information means, only authorised users are capable of accessing the information.
- Confidentiality
- Integrity
- Authentication
- Availability
Q5 | This helps in identifying the origin of information and
- Confidentiality
- Integrity
- Authentication
- Availability
Q6 | Data is used to ensure confidentiality.
- Encryption
- Locking
- Deleting
- Backup
Q7 | One common way to maintain data availability is
- Data Clustering
- Data backup
- Data Altering
- Data recovery
Q8 | The First Phase Of Hacking An IT System Is Compromise Of W hich Foundation Of Security?
- Confidentiality
- Integrity
- Authentication
- Availability
Q9 | Data integrity means
- providing first access to stored data
- ensuring correctness and consistency of
- providing data sharing
- none of the above
Q10 | Authentication refers to :
- methods ofrestricting user access to system
- controllingaccess to portions of
- controlling theoperation on the data
- all of the above
Q11 | does not have any management flow.
- Synchronous
- Casual
- Asynchronous
- Smart Interaction
Q12 | is proving that a message was sent by a certain sender.
- Confidentiality
- Integrity
- Authentication
- Availability
Q13 | means hiding contents of a message so that nobody else but the intended recipient can read it.
- Authenticity
- Integrity
- Encryption
- Availability
Q14 | is the act of taking data and rendering it unreadable to anyone except for the intended recipient. While on the other hand, is the act of a user proving that they are who they are, and that they can
- Encryption, Decryption
- Encryption, Availability
- Authentication, Encryption
- Encryption, Authentication
Q15 | ensures no one other our intended recipient(s) can eavesdrop on the message while provides confidentiality by scrambling the
- Encryption, Decryption
- Encryption, Availability
- Authentication, Encryption
- Confidentiality, Encryption
Q16 | ensures no one can alter the message before our intended recipient(s) sees it.
- Authenticity
- Integrity
- Encryption
- Availability
Q17 | ensures that the message really came from the supposed sender.
- Authenticity
- Integrity
- Encryption
- Availability
Q18 | Digital signatures combined with digital certificates provide by giving the recipient(s) a way to tie the message to an individual or entity who signed the message.
- Authenticity
- Integrity
- Encryption
- Availability
Q19 | transforms meaningful data into what looks like gibberish using a secret that can also be used to reverse the process. Reversing the process is called
- Encryption, Decryption
- Encryption, Availability
- Authentication, Encryption
- Confidentiality, Encryption
Q20 | is the process of convincing a gatekeeper that you are who you say you are, typically by proving that you know a secret, I.e. password, captcha
- Authenticity
- Integrity
- Encryption
- Availability
Q21 | A collection of nodes used for sensing the environment is known as .
- Voice Portal
- Mobile Portal
- Geolocation
- Sensor Network
Q22 | Sensors are those which require an external excitation signal or a power signal.
- Active
- Passive
- Active and Passive both
- All of above
Q23 | do not require any external power signal and directly generates output response.
- Active
- Passive
- Active andPassive both
- All of above
Q24 | is a non-contact type sensor that detects the presence of an object.
- Temperature
- Pressure
- Proximity
- All of above
Q25 | sensors are light based sensor that are used in various applications like Proximity and Object
- Temperature
- Pressure
- Infrared
- None of above