On This Page

This set of Information and Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information And Cyber Security Set 4

Q1 | From the options below, which of them is not a threat to information security?
  • disaster
  • eavesdropping
  • information leakage
  • unchanged default password
Q2 | Compromising confidential information comes under                    
  • bug
  • threat
  • vulnerability
  • attack
Q3 | Which of the following are not security policies?
  • regulatory
  • advisory
  • availability
  • user policies
Q4 | Examples of User Policies is/are:
  • password policies
  • internet usage
  • system use
  • all of the above
Q5 |            Policy ensures that the organization is maintaining standards set by specific industry regulation.
  • regulatory
  • advisory
  • availability
  • user policies
Q6 |              Policy is like standards rules and regulations set by the management to advise their employees on their activity or behavior
  • regulatory
  • advisory
  • availability
  • user policies
Q7 | What defines the restrictions on employees such as usage?
  • regulatory
  • advisory
  • availability
  • user policies
Q8 | The full form of OSI is OSI model is                              
  • open systems interconnection
  • open software interconnection
  • open systems internet
  • open software internet
Q9 | In layer, vulnerabilities are directly associated with physical access to networks and hardware.
  • physical
  • data-link
  • network
  • application
Q10 | Which of the following attack can actively modify communications or data?
  • both active and passive attacks
  • neither active and passive attacks
  • active attacks
  • passive attacks
Q11 | 3) Categories of Security Service
  • 1
  • 1 &3
  • 2& 3
  • 1,2,3
Q12 | Release of Message Content and Traffic analysis are type of :
  • both active and passive attacks
  • neither active and passive attacks
  • active attacks
  • passive attacks
Q13 | If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:
  • release of message content-passive attack
  • traffic analysis -passive attacks
  • release of message content- active attacks
  • traffic analysis -active attacks
Q14 | If communication between 2 people is overheard by a third person without extraction of any data, it is called as:
  • release of message content-passive attack
  • traffic analysis -passive attacks
  • release of message content- active attacks
  • traffic analysis -active attacks
Q15 |              means when an attacker pretends to be authentic user
  • masquerade
  • replay
  • modification
  • traffic analysis
Q16 |                        attack is when original data is modified and malicious data is inserted
  • masquerade
  • replay(rewrite)
  • modification
  • traffic analysis
Q17 | When original data is changed to make it non-meaningful by attacker it is known as
  • masquerade
  • replay
  • modification of messages
  • traffic analysis
Q18 | Which is the type of attack when Network is made unavailable for user
  • masquerade
  • replay
  • modification
  • denial of service
Q19 | Modification of Data is done in:
  • both active and passive attacks
  • neither active and passive attacks
  • active attacks
  • passive attacks
Q20 | The information that gets transformed in encryption is
  • plain text
  • parallel text
  • encrypted text
  • decrypted text
Q21 | A process of making the encrypted text readable again.
  • decryption
  • encryption
  • network security
  • information hiding
Q22 | A unique piece of information that is used in encryption.
  • cipher
  • plain text
  • key
  • cipher
Q23 | Assurance that authentic user is taking part in communication is:
  • authentication
  • authorization
  • access control
  • auditing
Q24 | ATM pin while withdrawing money is an example of using:
  • authentication
  • authorization
  • access control
  • auditing
Q25 | Study of creating a d using encryption and decryption techniques.
  • cipher
  • cryptography
  • encryption
  • decryption