Explore topic-wise MCQs in Cyber Security.

This section includes 20 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

Data integrity gets compromised when _____ and _____ are taken control off.

A. Access control, file deletion
B. Network, file permission
C. Access control, file permission
D. Network, system
Answer» D. Network, system
2.

Which of these is not a proper method of maintaining confidentiality?

A. Biometric verification
B. ID and password based verification
C. 2-factor authentication
D. switching off the phone
Answer» E.
3.

_______ of information means, only authorised users are capable of accessing the information.

A. Confidentiality
B. Integrity
C. Non-repudiation
D. Availability
Answer» E.
4.

When you use the word _____ it means you are protecting your data from getting disclosed.

A. Confidentiality
B. Integrity
C. Authentication
D. Availability
Answer» B. Integrity
5.

This is the model designed for guiding the policies of Information security within a company, firm or organization. What is “this” referred to here?

A. Confidentiality
B. Non-repudiation
C. CIA Triad
D. Authenticity
Answer» D. Authenticity
6.

WHY_THESE_4_ELEMENTS_(CONFIDENTIALITY,_INTEGRITY,_AUTHENTICITY_&_AVAILABILITY)_ARE_CONSIDERED_FUNDAMENTAL??$

A. They help understanding hacking better
B. They are key elements to a security breach
C. They help understands security and its components better
D. They help to understand the cyber-crime better
Answer» D. They help to understand the cyber-crime better
7.

Data ___________ is used to ensure confidentiality.$

A. Encryption
B. Locking
C. Deleting
D. Backup
Answer» B. Locking
8.

This_helps_in_identifying_the_origin_of_information_and_authentic_user._This_referred_to_here_as___________$

A. Confidentiality
B. Integrity
C. Authenticity
D. Availability
Answer» D. Availability
9.

One common way to maintain data availability is __________

A. Data clustering
B. Data backup
C. Data recovery
D. Data Altering
Answer» C. Data recovery
10.

______ is the latest technology that faces an extra challenge because of CIA paradigm.

A. Big data
B. Database systems
C. Cloud storages
D. Smart dust
Answer» B. Database systems
11.

Data integrity gets compromised when _____ and _____ are taken control off.

A. Access control, file deletion
B. Network, file permission
C. Access control, file permission
D. Network, system
Answer» D. Network, system
12.

Which_of_these_is_not_a_proper_method_of_maintaining_confidentiality?

A. Biometric verification
B. ID and password based verification
C. 2-factor authentication
D. switching off the phone
Answer» E.
13.

_______ of information means, only authorised users are capable of accessing the information?

A. Confidentiality
B. Integrity
C. Non-repudiation
D. Availability
Answer» E.
14.

When integrity is lacking in a security system, _________ occurs.

A. Database hacking
B. Data deletion
C. Data tampering
D. Data leakage
Answer» D. Data leakage
15.

______ means the protection of data from modification by unknown users.

A. Confidentiality
B. Integrity
C. Authentication
D. Non-repudiation
Answer» C. Authentication
16.

When you use the word _____ it means you are protecting your data from getting disclosed.

A. Confidentiality
B. Integrity
C. Authentication
D. Availability
Answer» B. Integrity
17.

CIA triad is also known as ________

A. NIC (Non-repudiation, Integrity, Confidentiality)
B. AIC (Availability, Integrity, Confidentiality)
C. AIN (Availability, Integrity, Non-repudiation)
D. AIC (Authenticity, Integrity, Confidentiality)
Answer» C. AIN (Availability, Integrity, Non-repudiation)
18.

This is the model designed for guiding the policies of Information security within a company, firm or organization. What is “this” referred to here?$

A. Confidentiality
B. Non-repudiation
C. CIA Triad
D. Authenticity
Answer» D. Authenticity
19.

According to the CIA Triad, which of the below-mentioned element is not considered in the triad?

A. Confidentiality
B. Integrity
C. Authenticity
D. Availability
Answer» D. Availability
20.

In general how many key elements constitute the entire security structure?

A. 1
B. 2
C. 3
D. 4
Answer» E.