MCQOPTIONS
Saved Bookmarks
This section includes 20 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Data integrity gets compromised when _____ and _____ are taken control off. |
| A. | Access control, file deletion |
| B. | Network, file permission |
| C. | Access control, file permission |
| D. | Network, system |
| Answer» D. Network, system | |
| 2. |
Which of these is not a proper method of maintaining confidentiality? |
| A. | Biometric verification |
| B. | ID and password based verification |
| C. | 2-factor authentication |
| D. | switching off the phone |
| Answer» E. | |
| 3. |
_______ of information means, only authorised users are capable of accessing the information. |
| A. | Confidentiality |
| B. | Integrity |
| C. | Non-repudiation |
| D. | Availability |
| Answer» E. | |
| 4. |
When you use the word _____ it means you are protecting your data from getting disclosed. |
| A. | Confidentiality |
| B. | Integrity |
| C. | Authentication |
| D. | Availability |
| Answer» B. Integrity | |
| 5. |
This is the model designed for guiding the policies of Information security within a company, firm or organization. What is “this” referred to here? |
| A. | Confidentiality |
| B. | Non-repudiation |
| C. | CIA Triad |
| D. | Authenticity |
| Answer» D. Authenticity | |
| 6. |
WHY_THESE_4_ELEMENTS_(CONFIDENTIALITY,_INTEGRITY,_AUTHENTICITY_&_AVAILABILITY)_ARE_CONSIDERED_FUNDAMENTAL??$ |
| A. | They help understanding hacking better |
| B. | They are key elements to a security breach |
| C. | They help understands security and its components better |
| D. | They help to understand the cyber-crime better |
| Answer» D. They help to understand the cyber-crime better | |
| 7. |
Data ___________ is used to ensure confidentiality.$ |
| A. | Encryption |
| B. | Locking |
| C. | Deleting |
| D. | Backup |
| Answer» B. Locking | |
| 8. |
This_helps_in_identifying_the_origin_of_information_and_authentic_user._This_referred_to_here_as___________$ |
| A. | Confidentiality |
| B. | Integrity |
| C. | Authenticity |
| D. | Availability |
| Answer» D. Availability | |
| 9. |
One common way to maintain data availability is __________ |
| A. | Data clustering |
| B. | Data backup |
| C. | Data recovery |
| D. | Data Altering |
| Answer» C. Data recovery | |
| 10. |
______ is the latest technology that faces an extra challenge because of CIA paradigm. |
| A. | Big data |
| B. | Database systems |
| C. | Cloud storages |
| D. | Smart dust |
| Answer» B. Database systems | |
| 11. |
Data integrity gets compromised when _____ and _____ are taken control off. |
| A. | Access control, file deletion |
| B. | Network, file permission |
| C. | Access control, file permission |
| D. | Network, system |
| Answer» D. Network, system | |
| 12. |
Which_of_these_is_not_a_proper_method_of_maintaining_confidentiality? |
| A. | Biometric verification |
| B. | ID and password based verification |
| C. | 2-factor authentication |
| D. | switching off the phone |
| Answer» E. | |
| 13. |
_______ of information means, only authorised users are capable of accessing the information? |
| A. | Confidentiality |
| B. | Integrity |
| C. | Non-repudiation |
| D. | Availability |
| Answer» E. | |
| 14. |
When integrity is lacking in a security system, _________ occurs. |
| A. | Database hacking |
| B. | Data deletion |
| C. | Data tampering |
| D. | Data leakage |
| Answer» D. Data leakage | |
| 15. |
______ means the protection of data from modification by unknown users. |
| A. | Confidentiality |
| B. | Integrity |
| C. | Authentication |
| D. | Non-repudiation |
| Answer» C. Authentication | |
| 16. |
When you use the word _____ it means you are protecting your data from getting disclosed. |
| A. | Confidentiality |
| B. | Integrity |
| C. | Authentication |
| D. | Availability |
| Answer» B. Integrity | |
| 17. |
CIA triad is also known as ________ |
| A. | NIC (Non-repudiation, Integrity, Confidentiality) |
| B. | AIC (Availability, Integrity, Confidentiality) |
| C. | AIN (Availability, Integrity, Non-repudiation) |
| D. | AIC (Authenticity, Integrity, Confidentiality) |
| Answer» C. AIN (Availability, Integrity, Non-repudiation) | |
| 18. |
This is the model designed for guiding the policies of Information security within a company, firm or organization. What is “this” referred to here?$ |
| A. | Confidentiality |
| B. | Non-repudiation |
| C. | CIA Triad |
| D. | Authenticity |
| Answer» D. Authenticity | |
| 19. |
According to the CIA Triad, which of the below-mentioned element is not considered in the triad? |
| A. | Confidentiality |
| B. | Integrity |
| C. | Authenticity |
| D. | Availability |
| Answer» D. Availability | |
| 20. |
In general how many key elements constitute the entire security structure? |
| A. | 1 |
| B. | 2 |
| C. | 3 |
| D. | 4 |
| Answer» E. | |