Security Multiple Choice Question MCQ
Categories: MCQS
1. In general how many key elements constitute the entire security structure? a) 1 b) 2 c) 3 d) 4 Answer: d 2. According to the CIA Triad, which of the below-mentioned element is not considered in the triad? a) Confidentiality b) Integrity c) Authenticity d) Availability Answer: c 3. This is the model designed for guiding the policies of Information security within a company, firm or organization. What is “this” referred to here? a) Confidentiality b) Non-repudiation c) CIA Triad d) Authenticity Answer: c 4. CIA triad is also known as ________ a) NIC (Non-repudiation, Integrity, Confidentiality) b) AIC (Availability, Integrity, Confidentiality) c) AIN (Availability, Integrity, Non-repudiation) d) AIC (Authenticity, Integrity, Confidentiality) Answer: b 5. When you use the word _____ it means you are protecting your data from getting disclosed. a) Confidentiality b) Integrity c) Authentication d) Availability Answer: a 6. ______ means the protection of data from modification by unknown users. a) Confidentiality b) Integrity c) Authentication d) Non-repudiation Answer: b 7. When integrity is lacking in a security system, _________ occurs. a) Database hacking b) Data deletion c) Data tampering d) Data leakage Answer: c 8. _______ of information means, only authorised users are capable of accessing the information. a) Confidentiality b) Integrity c) Non-repudiation d) Availability Answer: d 9. Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental? a) They help understanding hacking better b) They are key elements to a security breach c) They help understands security and its components better d) They help to understand the cyber-crime better Answer: c 10. This helps in identifying the origin of information and authentic user. This referred to here as __________ a) Confidentiality b) Integrity c) Authenticity d) Availability Answer: c 11. Data ___________ is used to ensure confidentiality. a) Encryption b) Locking c) Deleting d) Backup Answer: a 12. Which of these is not a proper method of maintaining confidentiality? a) Biometric verification b) ID and password based verification c) 2-factor authentication d) switching off the phone Answer: d 13. Data integrity gets compromised when _____ and _____ are taken control off. a) Access control, file deletion b) Network, file permission c) Access control, file permission d) Network, system Answer: c 14. ______ is the latest technology that faces an extra challenge because of CIA paradigm. a) Big data b) Database systems c) Cloud storages d) Smart dust Answer: a 15. One common way to maintain data availability is __________ a) Data clustering b) Data backup c) Data recovery d) Data Altering Answer: b