P Praveen Singh π Tutor III β 36.81K Points π Information Cyber Security Q. The ________ is encrypted text. (A) cipher scricpt (B) cipher text (C) secret text (D) secret script ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) cipher text
S Shiva Ram π Master β 30.44K Points π Information Cyber Security Q. Release of message contents and Traffic analysis are two types of _________ attacks. (A) active attack (B) modification of attack (C) passive attack (D) dos attack ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (C) passive attack
R Ram Sharma π Coach β 193.88K Points π Information Cyber Security Q. A company requires its users to change passwords every month. This improves the ________ of the network. (A) performance (B) reliability (C) security (D) none of the above ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (C) security
P Praveen Singh π Tutor III β 36.81K Points π Information Cyber Security Q. What does OSI stand for in the OSI Security Architecure? (A) open system interface (B) open systems interconnections (C) open source initiative (D) open standard interconnections ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) open systems interconnections
V Vijay Sangwan π Mover β 28.62K Points π Information Cyber Security Q. Data ___________ is used to ensure confidentiality. (A) encryption (B) locking (C) decryption (D) backup ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) encryption
A Admin π Coach β 38.23K Points π Information Cyber Security Q. This helps in identifying the origin of information and authentic user. This referred to here as __________ (A) confidentiality (B) integrity (C) authenticity (D) availability ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (C) authenticity
R Ranjeet π Tutor III β 34.60K Points π Information Cyber Security Q. _______ of information means, only authorized users are capable of accessing the information. (A) confidentiality (B) integrity (C) non-repudiation (D) availability ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (D) availability
P Praveen Singh π Tutor III β 36.81K Points π Information Cyber Security Q. _______ means the protection of data from modification by unknown users. (A) confidentiality (B) integrity (C) authentication (D) non-repudiation ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) integrity
R Rakesh Kumar π Hard Worker β 28.44K Points π Information Cyber Security Q. When you use the word ______it means you are protecting your data from getting disclosed. (A) confidentiality (B) integrity (C) authentication (D) availability ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) confidentiality