MCQ Questions - Mid PDF

Document Details

ModestClematis2479

Uploaded by ModestClematis2479

Borg El Arab Technological University

Tags

computer security information security cyber security security

Summary

This document contains multiple choice questions (MCQs) on various security topics, including computer security, data confidentiality, privacy, system integrity, and availability. The questions cover different aspects of security mechanisms, threats, and attacks.

Full Transcript

Q1. ……….. is the protection provided to a system in order to attain the integrity, availability, and confidentiality of information system resources Answer: Computer Security Q2. In …………., confidential information is not made available to unauthorized persons. Answer: Data Confidentiality...

Q1. ……….. is the protection provided to a system in order to attain the integrity, availability, and confidentiality of information system resources Answer: Computer Security Q2. In …………., confidential information is not made available to unauthorized persons. Answer: Data Confidentiality Q3. In …………., users control what information related to them to collect and store. Answer: Privacy Q4. In …………., information and programs are changed in authorized manner. Answer: Data integrity Q5. In …………, system performs its function free from unauthorized manipulation. Answer: System integrity Q6. In …………., systems work on time and service is provided to authorized users. Answer: Availability Q7. A process designed to detect, prevent, or recover from a security attack is …………. Answer: Security Mechanism Q8. ……… is a processing that enhanced security of data processing systems and information transfers. Answer: Security service Q9. ……… is a potential for violation of system security. Answer: Threat Q10. Any action that caused dangerous to the security of information is …………. Answer: Security Attack Q11. ………… attacks are difficult to detect because they do not change the data. Answer: Passive Q12. The unauthorized reading of a message and traffic analysis are ……….. attacks. Answer: Passive Q13. Modification of messages or files, and denial of service is ……. attacks. Answer: Active Q14. In ……….., pretend to be a different entity. Answer: Masquerade Q15. In…………, capture data for retransmission. Answer: Replay Q16. ………… is a disruption of network by disabling or overloading. Answer: Denial of service Q17. In …………… some portion of legitimate message is changed. Answer: Modification of message Q18. ……….is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks Answer: Cyber security Q19. ………. is securing a computer network from attackers or malware. Answer: Network security Q20. ………. focuses on keeping software and devices free of threats. Answer: Application security Q21. ………. protects the integrity and privacy of data. Answer: Information security Q22. The processes and decisions for handling and protecting data is ……….. Answer: Operational security Q23. How an organization responds to the loss of operations/data is ……….. Answer: Disaster recovery Q24. In ………. both sender and receiver use the same key. Answer: Symmetric Encryption Q25. ………. has other names like Classical / Conventional / Single-key encryption. Answer: Symmetric Encryption Q26. In ………. sender and receiver use different keys. Answer: Asymmetric Encryption Q27. In ……….., each element of plaintext is mapped to another element Answer: Substitution Q28. In ……….., plaintext elements rearranged. Answer: Transposition

Use Quizgecko on...
Browser
Browser