On This Page

This set of Information and Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information And Cyber Security Set 3

Q1 |                       is used for encrypting data at network level
  • ipsec
  • https
  • smtp
  • s/mime
Q2 | WPA2 is used for security in                  
  • ethernet
  • wi-fi
  • bluetooth
  • e-mail
Q3 | Which of the following is not a strong security protocol
  • ssl
  • httpl
  • smtp
  • sftp
Q4 | TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS basedconnection.
  • true
  • false
Q5 | IPSec operates in..... different modes
  • 3
  • 2
  • 4
  • 5
Q6 | length of the IPv4 address is ....
  • 32 bits
  • 64 bits
  • 16 bits
  • 128 bit
Q7 | Internet Key Exchange has .... phases and modes of operations
  • 4
  • 3
  • 2
  • 5
Q8 | PGP is abbreviated as
  • pretty good privacy
  • pretty good policy
  • policy good privacy
  • pretty good protection
Q9 | SET stands for
  • set electronic transaction
  • secure electronictransaction
  • simple electronictransaction
  • none of the above
Q10 | Transport layer Protocol consists of ... main components
  • 2
  • 1
  • 3
  • 4
Q11 | length of the IPv6 acddress is ....
  • 32 bits
  • 64 bits
  • 16 bits
  • 128 bit
Q12 | SSL provides .
  • message integrity
  • confidentiality
  • compression
  • all of the above
Q13 | IPSec provides ....protocols for network layer
  • 7
  • 3
  • 1
  • 4
Q14 | length of the IPv6 header is....
  • 64 bits
  • 16 bits
  • 32 bits
  • 8 bits
Q15 | According to the CIA Triad, which of the below-mentioned element is not considered in the triad?
  • confidentiality
  • integrity
  • authenticity
  • availability
Q16 | CIA triad is also known as                  
  • nic (non-repudiation, integrity, confidentiality)
  • aic (availability, integrity, confidentiality)
  • ain (availability, integrity, non-repudiation)
  • aic (authenticity, integrity, confidentiality)
Q17 |                of information means, only authorised users are capable of accessing the information.
  • confidentiality
  • integrity
  • non-repudiation
  • availability
Q18 |              means the protection of data from modification by unknown users.
  • confidentiality
  • integrity
  • authentication
  • non-repudiation
Q19 | When you use the word it means you are protecting your data from getting disclosed.
  • confidentiality
  • integrity
  • authentication
  • availability
Q20 | When integrity is lacking in a security system,                     occurs.
  • database hacking
  • data deletion
  • data tampering
  • data leakage
Q21 | Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?
  • they help understanding hacking better
  • they are key elements to a security breach
  • they help understands security and its components better
  • they help to understand the cyber-crime better
Q22 | This helps in identifying the origin of information and authentic user. This referred to here as                      
  • confidentiality
  • integrity
  • authenticity
  • availability
Q23 | Data is used to ensure confidentiality.
  • encryption
  • locking
  • deleting
  • backup
Q24 | Data integrity gets compromised when and are taken control off.
  • access control, file deletion
  • network, file permission
  • access control, file permission
  • network, system
Q25 |                is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.
  • network security
  • database security
  • information security
  • physical security