

MCQOPTIONS
Saved Bookmarks
This section includes 20 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
Data integrity gets compromised when _____ and _____ are taken control off. |
A. | Access control, file deletion |
B. | Network, file permission |
C. | Access control, file permission |
D. | Network, system |
Answer» D. Network, system | |
2. |
Which of these is not a proper method of maintaining confidentiality? |
A. | Biometric verification |
B. | ID and password based verification |
C. | 2-factor authentication |
D. | switching off the phone |
Answer» E. | |
3. |
_______ of information means, only authorised users are capable of accessing the information. |
A. | Confidentiality |
B. | Integrity |
C. | Non-repudiation |
D. | Availability |
Answer» E. | |
4. |
When you use the word _____ it means you are protecting your data from getting disclosed. |
A. | Confidentiality |
B. | Integrity |
C. | Authentication |
D. | Availability |
Answer» B. Integrity | |
5. |
This is the model designed for guiding the policies of Information security within a company, firm or organization. What is “this” referred to here? |
A. | Confidentiality |
B. | Non-repudiation |
C. | CIA Triad |
D. | Authenticity |
Answer» D. Authenticity | |
6. |
WHY_THESE_4_ELEMENTS_(CONFIDENTIALITY,_INTEGRITY,_AUTHENTICITY_&_AVAILABILITY)_ARE_CONSIDERED_FUNDAMENTAL??$ |
A. | They help understanding hacking better |
B. | They are key elements to a security breach |
C. | They help understands security and its components better |
D. | They help to understand the cyber-crime better |
Answer» D. They help to understand the cyber-crime better | |
7. |
Data ___________ is used to ensure confidentiality.$ |
A. | Encryption |
B. | Locking |
C. | Deleting |
D. | Backup |
Answer» B. Locking | |
8. |
This_helps_in_identifying_the_origin_of_information_and_authentic_user._This_referred_to_here_as___________$ |
A. | Confidentiality |
B. | Integrity |
C. | Authenticity |
D. | Availability |
Answer» D. Availability | |
9. |
One common way to maintain data availability is __________ |
A. | Data clustering |
B. | Data backup |
C. | Data recovery |
D. | Data Altering |
Answer» C. Data recovery | |
10. |
______ is the latest technology that faces an extra challenge because of CIA paradigm. |
A. | Big data |
B. | Database systems |
C. | Cloud storages |
D. | Smart dust |
Answer» B. Database systems | |
11. |
Data integrity gets compromised when _____ and _____ are taken control off. |
A. | Access control, file deletion |
B. | Network, file permission |
C. | Access control, file permission |
D. | Network, system |
Answer» D. Network, system | |
12. |
Which_of_these_is_not_a_proper_method_of_maintaining_confidentiality? |
A. | Biometric verification |
B. | ID and password based verification |
C. | 2-factor authentication |
D. | switching off the phone |
Answer» E. | |
13. |
_______ of information means, only authorised users are capable of accessing the information? |
A. | Confidentiality |
B. | Integrity |
C. | Non-repudiation |
D. | Availability |
Answer» E. | |
14. |
When integrity is lacking in a security system, _________ occurs. |
A. | Database hacking |
B. | Data deletion |
C. | Data tampering |
D. | Data leakage |
Answer» D. Data leakage | |
15. |
______ means the protection of data from modification by unknown users. |
A. | Confidentiality |
B. | Integrity |
C. | Authentication |
D. | Non-repudiation |
Answer» C. Authentication | |
16. |
When you use the word _____ it means you are protecting your data from getting disclosed. |
A. | Confidentiality |
B. | Integrity |
C. | Authentication |
D. | Availability |
Answer» B. Integrity | |
17. |
CIA triad is also known as ________ |
A. | NIC (Non-repudiation, Integrity, Confidentiality) |
B. | AIC (Availability, Integrity, Confidentiality) |
C. | AIN (Availability, Integrity, Non-repudiation) |
D. | AIC (Authenticity, Integrity, Confidentiality) |
Answer» C. AIN (Availability, Integrity, Non-repudiation) | |
18. |
This is the model designed for guiding the policies of Information security within a company, firm or organization. What is “this” referred to here?$ |
A. | Confidentiality |
B. | Non-repudiation |
C. | CIA Triad |
D. | Authenticity |
Answer» D. Authenticity | |
19. |
According to the CIA Triad, which of the below-mentioned element is not considered in the triad? |
A. | Confidentiality |
B. | Integrity |
C. | Authenticity |
D. | Availability |
Answer» D. Availability | |
20. |
In general how many key elements constitute the entire security structure? |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» E. | |