A Admin π Coach β 38.23K Points π Information Cyber Security Q. Categories of Security Service (A) 1 (B) 1 &3 (C) 2& 3 (D) 1,2,3 ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (D) 1,2,3
P Priyanka Tomar π Tutor III β 35.28K Points π Information Cyber Security Q. Which of the following attack can actively modify communications or data? (A) both active and passive attacks (B) neither active and passive attacks (C) active attacks (D) passive attacks ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (C) active attacks
R Rakesh Kumar π Hard Worker β 28.44K Points π Information Cyber Security Q. What defines the restrictions on employees such as usage? (A) regulatory (B) advisory (C) availability (D) user policies ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (D) user policies
A Admin π Coach β 38.23K Points π Information Cyber Security Q. Policy is like standards rules and regulations set by the management to advise their employees on their activity or behavior (A) regulatory (B) advisory (C) availability (D) user policies ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) advisory
R Ranjeet π Tutor III β 34.60K Points π Information Cyber Security Q. Policy ensures that the organization is maintaining standards set by specific industry regulation. (A) regulatory (B) advisory (C) availability (D) user policies ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) regulatory
V Vijay Sangwan π Mover β 28.62K Points π Information Cyber Security Q. Examples of User Policies is/are: (A) password policies (B) internet usage (C) system use (D) all of the above ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (D) all of the above
P Priyanka Tomar π Tutor III β 35.28K Points π Information Cyber Security Q. Which of the following are not security policies? (A) regulatory (B) advisory (C) availability (D) user policies ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (C) availability
R Rakesh Kumar π Hard Worker β 28.44K Points π Information Cyber Security Q. According to the CIA Triad, which of the below-mentioned element is not considered in the triad? (A) confidentiality (B) integrity (C) authenticity (D) availability ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (C) authenticity
A Admin π Coach β 38.23K Points π Information Cyber Security Q. SSL provides . (A) message integrity (B) confidentiality (C) compression (D) all of the above ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (D) all of the above
A Admin π Coach β 38.23K Points π Information Cyber Security Q. WPA2 is used for security in (A) ethernet (B) wi-fi (C) bluetooth (D) e-mail ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) wi-fi