Information And Cyber Security Set 4
On This Page
This set of Information and Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information And Cyber Security Set 4
Q1 | From the options below, which of them is not a threat to information security?
- disaster
- eavesdropping
- information leakage
- unchanged default password
Q2 | Compromising confidential information comes under
- bug
- threat
- vulnerability
- attack
Q3 | Which of the following are not security policies?
- regulatory
- advisory
- availability
- user policies
Q4 | Examples of User Policies is/are:
- password policies
- internet usage
- system use
- all of the above
Q5 | Policy ensures that the organization is maintaining standards set by specific industry regulation.
- regulatory
- advisory
- availability
- user policies
Q6 | Policy is like standards rules and regulations set by the management to advise their employees on their activity or behavior
- regulatory
- advisory
- availability
- user policies
Q7 | What defines the restrictions on employees such as usage?
- regulatory
- advisory
- availability
- user policies
Q8 | The full form of OSI is OSI model is
- open systems interconnection
- open software interconnection
- open systems internet
- open software internet
Q9 | In layer, vulnerabilities are directly associated with physical access to networks and hardware.
- physical
- data-link
- network
- application
Q10 | Which of the following attack can actively modify communications or data?
- both active and passive attacks
- neither active and passive attacks
- active attacks
- passive attacks
Q11 | 3) Categories of Security Service
- 1
- 1 &3
- 2& 3
- 1,2,3
Q12 | Release of Message Content and Traffic analysis are type of :
- both active and passive attacks
- neither active and passive attacks
- active attacks
- passive attacks
Q13 | If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:
- release of message content-passive attack
- traffic analysis -passive attacks
- release of message content- active attacks
- traffic analysis -active attacks
Q14 | If communication between 2 people is overheard by a third person without extraction of any data, it is called as:
- release of message content-passive attack
- traffic analysis -passive attacks
- release of message content- active attacks
- traffic analysis -active attacks
Q15 | means when an attacker pretends to be authentic user
- masquerade
- replay
- modification
- traffic analysis
Q16 | attack is when original data is modified and malicious data is inserted
- masquerade
- replay(rewrite)
- modification
- traffic analysis
Q17 | When original data is changed to make it non-meaningful by attacker it is known as
- masquerade
- replay
- modification of messages
- traffic analysis
Q18 | Which is the type of attack when Network is made unavailable for user
- masquerade
- replay
- modification
- denial of service
Q19 | Modification of Data is done in:
- both active and passive attacks
- neither active and passive attacks
- active attacks
- passive attacks
Q20 | The information that gets transformed in encryption is
- plain text
- parallel text
- encrypted text
- decrypted text
Q21 | A process of making the encrypted text readable again.
- decryption
- encryption
- network security
- information hiding
Q22 | A unique piece of information that is used in encryption.
- cipher
- plain text
- key
- cipher
Q23 | Assurance that authentic user is taking part in communication is:
- authentication
- authorization
- access control
- auditing
Q24 | ATM pin while withdrawing money is an example of using:
- authentication
- authorization
- access control
- auditing
Q25 | Study of creating a d using encryption and decryption techniques.
- cipher
- cryptography
- encryption
- decryption