On This Page

This set of Information and Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information And Cyber Security Set 3

Q1 |                       is used for encrypting data at network level
Q2 | WPA2 is used for security in                  
Q3 | Which of the following is not a strong security protocol
Q4 | TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS basedconnection.
Q5 | IPSec operates in..... different modes
Q6 | length of the IPv4 address is ....
Q7 | Internet Key Exchange has .... phases and modes of operations
Q8 | PGP is abbreviated as
Q9 | SET stands for
Q10 | Transport layer Protocol consists of ... main components
Q11 | length of the IPv6 acddress is ....
Q12 | SSL provides .
Q13 | IPSec provides ....protocols for network layer
Q14 | length of the IPv6 header is....
Q15 | According to the CIA Triad, which of the below-mentioned element is not considered in the triad?
Q16 | CIA triad is also known as                  
Q17 |                of information means, only authorised users are capable of accessing the information.
Q18 |              means the protection of data from modification by unknown users.
Q19 | When you use the word it means you are protecting your data from getting disclosed.
Q20 | When integrity is lacking in a security system,                     occurs.
Q21 | Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?
Q22 | This helps in identifying the origin of information and authentic user. This referred to here as                      
Q23 | Data is used to ensure confidentiality.
Q24 | Data integrity gets compromised when and are taken control off.
Q25 |                is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.