 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 20 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | Data integrity gets compromised when _____ and _____ are taken control off. | 
| A. | Access control, file deletion | 
| B. | Network, file permission | 
| C. | Access control, file permission | 
| D. | Network, system | 
| Answer» D. Network, system | |
| 2. | Which of these is not a proper method of maintaining confidentiality? | 
| A. | Biometric verification | 
| B. | ID and password based verification | 
| C. | 2-factor authentication | 
| D. | switching off the phone | 
| Answer» E. | |
| 3. | _______ of information means, only authorised users are capable of accessing the information. | 
| A. | Confidentiality | 
| B. | Integrity | 
| C. | Non-repudiation | 
| D. | Availability | 
| Answer» E. | |
| 4. | When you use the word _____ it means you are protecting your data from getting disclosed. | 
| A. | Confidentiality | 
| B. | Integrity | 
| C. | Authentication | 
| D. | Availability | 
| Answer» B. Integrity | |
| 5. | This is the model designed for guiding the policies of Information security within a company, firm or organization. What is “this” referred to here? | 
| A. | Confidentiality | 
| B. | Non-repudiation | 
| C. | CIA Triad | 
| D. | Authenticity | 
| Answer» D. Authenticity | |
| 6. | WHY_THESE_4_ELEMENTS_(CONFIDENTIALITY,_INTEGRITY,_AUTHENTICITY_&_AVAILABILITY)_ARE_CONSIDERED_FUNDAMENTAL??$ | 
| A. | They help understanding hacking better | 
| B. | They are key elements to a security breach | 
| C. | They help understands security and its components better | 
| D. | They help to understand the cyber-crime better | 
| Answer» D. They help to understand the cyber-crime better | |
| 7. | Data ___________ is used to ensure confidentiality.$ | 
| A. | Encryption | 
| B. | Locking | 
| C. | Deleting | 
| D. | Backup | 
| Answer» B. Locking | |
| 8. | This_helps_in_identifying_the_origin_of_information_and_authentic_user._This_referred_to_here_as___________$ | 
| A. | Confidentiality | 
| B. | Integrity | 
| C. | Authenticity | 
| D. | Availability | 
| Answer» D. Availability | |
| 9. | One common way to maintain data availability is __________ | 
| A. | Data clustering | 
| B. | Data backup | 
| C. | Data recovery | 
| D. | Data Altering | 
| Answer» C. Data recovery | |
| 10. | ______ is the latest technology that faces an extra challenge because of CIA paradigm. | 
| A. | Big data | 
| B. | Database systems | 
| C. | Cloud storages | 
| D. | Smart dust | 
| Answer» B. Database systems | |
| 11. | Data integrity gets compromised when _____ and _____ are taken control off. | 
| A. | Access control, file deletion | 
| B. | Network, file permission | 
| C. | Access control, file permission | 
| D. | Network, system | 
| Answer» D. Network, system | |
| 12. | Which_of_these_is_not_a_proper_method_of_maintaining_confidentiality? | 
| A. | Biometric verification | 
| B. | ID and password based verification | 
| C. | 2-factor authentication | 
| D. | switching off the phone | 
| Answer» E. | |
| 13. | _______ of information means, only authorised users are capable of accessing the information? | 
| A. | Confidentiality | 
| B. | Integrity | 
| C. | Non-repudiation | 
| D. | Availability | 
| Answer» E. | |
| 14. | When integrity is lacking in a security system, _________ occurs. | 
| A. | Database hacking | 
| B. | Data deletion | 
| C. | Data tampering | 
| D. | Data leakage | 
| Answer» D. Data leakage | |
| 15. | ______ means the protection of data from modification by unknown users. | 
| A. | Confidentiality | 
| B. | Integrity | 
| C. | Authentication | 
| D. | Non-repudiation | 
| Answer» C. Authentication | |
| 16. | When you use the word _____ it means you are protecting your data from getting disclosed. | 
| A. | Confidentiality | 
| B. | Integrity | 
| C. | Authentication | 
| D. | Availability | 
| Answer» B. Integrity | |
| 17. | CIA triad is also known as ________ | 
| A. | NIC (Non-repudiation, Integrity, Confidentiality) | 
| B. | AIC (Availability, Integrity, Confidentiality) | 
| C. | AIN (Availability, Integrity, Non-repudiation) | 
| D. | AIC (Authenticity, Integrity, Confidentiality) | 
| Answer» C. AIN (Availability, Integrity, Non-repudiation) | |
| 18. | This is the model designed for guiding the policies of Information security within a company, firm or organization. What is “this” referred to here?$ | 
| A. | Confidentiality | 
| B. | Non-repudiation | 
| C. | CIA Triad | 
| D. | Authenticity | 
| Answer» D. Authenticity | |
| 19. | According to the CIA Triad, which of the below-mentioned element is not considered in the triad? | 
| A. | Confidentiality | 
| B. | Integrity | 
| C. | Authenticity | 
| D. | Availability | 
| Answer» D. Availability | |
| 20. | In general how many key elements constitute the entire security structure? | 
| A. | 1 | 
| B. | 2 | 
| C. | 3 | 
| D. | 4 | 
| Answer» E. | |