On This Page

This set of Ubiquitous Computing System UCS Multiple Choice Questions & Answers (MCQs) focuses on Ubiquitous Computing System Set 8

Q1 | When you use the word it means you are protecting your data from getting disclosed.
  • Confidentiality
  • Integrity
  • Authentication
  • Availability
Q2 |                    is what every individual prefer in terms of physical privacy as well as digital privacy.
  • Confidentiality
  • Integrity
  • Authentication
  • Availability
Q3 |              means the protection of data from modification by unknown users.
  • Confidentiality
  • Integrity
  • Authentication
  • Availability
Q4 | of information means, only authorised users are capable of accessing the information.
  • Confidentiality
  • Integrity
  • Authentication
  • Availability
Q5 | This helps in identifying the origin of information and
  • Confidentiality
  • Integrity
  • Authentication
  • Availability
Q6 | Data is used to ensure confidentiality.
  • Encryption
  • Locking
  • Deleting
  • Backup
Q7 | One common way to maintain data availability is
  • Data Clustering
  • Data backup
  • Data Altering
  • Data recovery
Q8 | The First Phase Of Hacking An IT System Is Compromise   Of W hich Foundation Of Security?
  • Confidentiality
  • Integrity
  • Authentication
  • Availability
Q9 | Data integrity means
  • providing first access to stored data
  • ensuring correctness and consistency of
  • providing data sharing
  • none of the above
Q10 | Authentication refers to :
  • methods ofrestricting user access to system
  • controllingaccess to portions of
  • controlling theoperation on the data
  • all of the above
Q11 |                                        does not have any management flow.
  • Synchronous
  • Casual
  • Asynchronous
  • Smart Interaction
Q12 | is proving that a message was sent by a certain sender.
  • Confidentiality
  • Integrity
  • Authentication
  • Availability
Q13 | means hiding contents of a message so that nobody else but the intended recipient can read it.
  • Authenticity
  • Integrity
  • Encryption
  • Availability
Q14 |                                    is the act of taking data and rendering it unreadable to anyone except for the intended recipient. While on the other hand, is the act of a user proving that they are who they are, and that they can
  • Encryption, Decryption
  • Encryption, Availability
  • Authentication, Encryption
  • Encryption, Authentication
Q15 |                                  ensures no one other our intended recipient(s) can eavesdrop on the message while                              provides confidentiality by scrambling the
  • Encryption, Decryption
  • Encryption, Availability
  • Authentication, Encryption
  • Confidentiality, Encryption
Q16 | ensures no one can alter the message before our intended recipient(s) sees it.
  • Authenticity
  • Integrity
  • Encryption
  • Availability
Q17 | ensures that the message really came from the supposed sender.
  • Authenticity
  • Integrity
  • Encryption
  • Availability
Q18 | Digital signatures combined with digital certificates provide                          by giving the recipient(s) a way to tie the message to an individual or entity who signed the message.
  • Authenticity
  • Integrity
  • Encryption
  • Availability
Q19 |                                transforms meaningful data into what looks like gibberish using a secret that can also be used to reverse the process. Reversing the process is called
  • Encryption, Decryption
  • Encryption, Availability
  • Authentication, Encryption
  • Confidentiality, Encryption
Q20 |                         is the process of convincing a gatekeeper that you are who you say you are, typically by proving that you know a secret, I.e. password, captcha
  • Authenticity
  • Integrity
  • Encryption
  • Availability
Q21 | A collection of nodes used for sensing the environment is known as .
  • Voice Portal
  • Mobile Portal
  • Geolocation
  • Sensor Network
Q22 | Sensors are those which require an external excitation signal or a power signal.
  • Active
  • Passive
  • Active and Passive both
  • All of above
Q23 | do not require any external power signal and directly generates output response.
  • Active
  • Passive
  • Active andPassive both
  • All of above
Q24 | is a non-contact type sensor that detects the presence of an object.
  • Temperature
  • Pressure
  • Proximity
  • All of above
Q25 | sensors are light based sensor that are used in various applications like Proximity and Object
  • Temperature
  • Pressure
  • Infrared
  • None of above