πŸ“Š Information Cyber Security
Q. Release of message contents and Traffic analysis are two types of _________ attacks.
  • (A) active attack
  • (B) modification of attack
  • (C) passive attack
  • (D) dos attack
πŸ’¬ Discuss
βœ… Correct Answer: (C) passive attack
πŸ“Š Information Cyber Security
Q. A company requires its users to change passwords every month. This improves the ________ of the network.
  • (A) performance
  • (B) reliability
  • (C) security
  • (D) none of the above
πŸ’¬ Discuss
βœ… Correct Answer: (C) security
πŸ“Š Information Cyber Security
Q. What does OSI stand for in the OSI Security Architecure?
  • (A) open system interface
  • (B) open systems interconnections
  • (C) open source initiative
  • (D) open standard interconnections
πŸ’¬ Discuss
βœ… Correct Answer: (B) open systems interconnections
πŸ“Š Information Cyber Security
Q. This helps in identifying the origin of information and authentic user. This referred to here as __________
  • (A) confidentiality
  • (B) integrity
  • (C) authenticity
  • (D) availability
πŸ’¬ Discuss
βœ… Correct Answer: (C) authenticity
πŸ“Š Information Cyber Security
Q. _______ of information means, only authorized users are capable of accessing the information.
  • (A) confidentiality
  • (B) integrity
  • (C) non-repudiation
  • (D) availability
πŸ’¬ Discuss
βœ… Correct Answer: (D) availability
πŸ“Š Information Cyber Security
Q. _______ means the protection of data from modification by unknown users.
  • (A) confidentiality
  • (B) integrity
  • (C) authentication
  • (D) non-repudiation
πŸ’¬ Discuss
βœ… Correct Answer: (B) integrity
πŸ“Š Information Cyber Security
Q. When you use the word ______it means you are protecting your data from getting disclosed.
  • (A) confidentiality
  • (B) integrity
  • (C) authentication
  • (D) availability
πŸ’¬ Discuss
βœ… Correct Answer: (A) confidentiality