πŸ“Š Information Cyber Security
Q. Which of the following attack can actively modify communications or data?
  • (A) both active and passive attacks
  • (B) neither active and passive attacks
  • (C) active attacks
  • (D) passive attacks
πŸ’¬ Discuss
βœ… Correct Answer: (C) active attacks
πŸ“Š Information Cyber Security
Q. What defines the restrictions on employees such as usage?
  • (A) regulatory
  • (B) advisory
  • (C) availability
  • (D) user policies
πŸ’¬ Discuss
βœ… Correct Answer: (D) user policies
πŸ“Š Information Cyber Security
Q. Policy is like standards rules and regulations set by the management to advise their employees on their activity or behavior
  • (A) regulatory
  • (B) advisory
  • (C) availability
  • (D) user policies
πŸ’¬ Discuss
βœ… Correct Answer: (B) advisory
πŸ“Š Information Cyber Security
Q. Policy ensures that the organization is maintaining standards set by specific industry regulation.
  • (A) regulatory
  • (B) advisory
  • (C) availability
  • (D) user policies
πŸ’¬ Discuss
βœ… Correct Answer: (A) regulatory
πŸ“Š Information Cyber Security
Q. According to the CIA Triad, which of the below-mentioned element is not considered in the triad?
  • (A) confidentiality
  • (B) integrity
  • (C) authenticity
  • (D) availability
πŸ’¬ Discuss
βœ… Correct Answer: (C) authenticity
πŸ“Š Information Cyber Security
Q. SSL provides .
  • (A) message integrity
  • (B) confidentiality
  • (C) compression
  • (D) all of the above
πŸ’¬ Discuss
βœ… Correct Answer: (D) all of the above