On This Page

This set of Information Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information Cyber Security Set 10

Q1 | Transport layer Protocol consists of ... main components
Q2 | length of the IPv6 acddress is ....
Q3 | IPSec provides ....protocols for network layer
Q4 | length of the IPv6 header is....
Q5 | CIA triad is also known as                  
Q6 |                of information means, only authorised users are capable of accessing the information.
Q7 |              means the protection of data from modification by unknown users.
Q8 | When you use the word it means you are protecting your data from getting disclosed.
Q9 | When integrity is lacking in a security system,                     occurs.
Q10 | Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?
Q11 | This helps in identifying the origin of information and authentic user. This referred to here as                      
Q12 | Data is used to ensure confidentiality.
Q13 | Data integrity gets compromised when and are taken control off.
Q14 |                is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.
Q15 | From the options below, which of them is not a threat to information security?
Q16 | Compromising confidential information comes under                    
Q17 | The full form of OSI is OSI model is                              
Q18 | In layer, vulnerabilities are directly associated with physical access to networks and hardware.
Q19 | If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:
Q20 | If communication between 2 people is overheard by a third person without extraction of any data, it is called as:
Q21 | The information that gets transformed in encryption is
Q22 | A unique piece of information that is used in encryption.
Q23 | Study of creating a d using encryption and decryption techniques.
Q24 | An attack in which the user receives unwanted amount of e- mails.
Q25 | In same keys are implemented for encrypting as well as decrypting the information.