Information And Cyber Security Set 3
On This Page
This set of Information and Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information And Cyber Security Set 3
Q1 | is used for encrypting data at network level
- ipsec
- https
- smtp
- s/mime
Q2 | WPA2 is used for security in
- ethernet
- wi-fi
- bluetooth
Q3 | Which of the following is not a strong security protocol
- ssl
- httpl
- smtp
- sftp
Q4 | TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS basedconnection.
- true
- false
Q5 | IPSec operates in..... different modes
- 3
- 2
- 4
- 5
Q6 | length of the IPv4 address is ....
- 32 bits
- 64 bits
- 16 bits
- 128 bit
Q7 | Internet Key Exchange has .... phases and modes of operations
- 4
- 3
- 2
- 5
Q8 | PGP is abbreviated as
- pretty good privacy
- pretty good policy
- policy good privacy
- pretty good protection
Q9 | SET stands for
- set electronic transaction
- secure electronictransaction
- simple electronictransaction
- none of the above
Q10 | Transport layer Protocol consists of ... main components
- 2
- 1
- 3
- 4
Q11 | length of the IPv6 acddress is ....
- 32 bits
- 64 bits
- 16 bits
- 128 bit
Q12 | SSL provides .
- message integrity
- confidentiality
- compression
- all of the above
Q13 | IPSec provides ....protocols for network layer
- 7
- 3
- 1
- 4
Q14 | length of the IPv6 header is....
- 64 bits
- 16 bits
- 32 bits
- 8 bits
Q15 | According to the CIA Triad, which of the below-mentioned element is not considered in the triad?
- confidentiality
- integrity
- authenticity
- availability
Q16 | CIA triad is also known as
- nic (non-repudiation, integrity, confidentiality)
- aic (availability, integrity, confidentiality)
- ain (availability, integrity, non-repudiation)
- aic (authenticity, integrity, confidentiality)
Q17 | of information means, only authorised users are capable of accessing the information.
- confidentiality
- integrity
- non-repudiation
- availability
Q18 | means the protection of data from modification by unknown users.
- confidentiality
- integrity
- authentication
- non-repudiation
Q19 | When you use the word it means you are protecting your data from getting disclosed.
- confidentiality
- integrity
- authentication
- availability
Q20 | When integrity is lacking in a security system, occurs.
- database hacking
- data deletion
- data tampering
- data leakage
Q21 | Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?
- they help understanding hacking better
- they are key elements to a security breach
- they help understands security and its components better
- they help to understand the cyber-crime better
Q22 | This helps in identifying the origin of information and authentic user. This referred to here as
- confidentiality
- integrity
- authenticity
- availability
Q23 | Data is used to ensure confidentiality.
- encryption
- locking
- deleting
- backup
Q24 | Data integrity gets compromised when and are taken control off.
- access control, file deletion
- network, file permission
- access control, file permission
- network, system
Q25 | is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.
- network security
- database security
- information security
- physical security