Introduction To Cyber Security MCQ: Information Security Concepts- Network Security, attacks, Computer Forensics, Steganography

Introduction To Cyber Security MCQ: Information Security Concepts- Network Security, attacks, Computer Forensics, Steganography: Link1

Introduction To Cyber Security MCQ & Answers

       Are you worried about the answers to Introduction To Cyber Security-Information Security Concepts- Network Security, attacks, Computer Forensics, Steganography questions :Topology, Types Of Networks, TCP, IP Protocol, Internet? We have arranged the Show Answer button under the each question. Candidates can click on it to know the right option among the given alternatives. Furthermore, the applicants can check our web portal @ www.totalmcq.com to take part in more MCQ on various subject. Wish, the given information about the Introduction To Cyber Security MCQ will helpful to the advance and can learn the various types of questions and answers.


Q.1. In computer security, ------- means that computer system assets can be modified only by authorized parities.

A. Confidentiality                                                    B. Availability
C. Integrity                               D. Authenticity

Q.2. In computer security, --------- means that the information in a computer system only be accessible for reading by authorized parities.

A. Integrity                                                                B. Availability
C. Authenticity                                                           D. Confidentiality

Q.3. The term e-commerce includes----------

A. Electronic trading of Physical goods and intangibles such as information
B. The electronic provision of services such as after sales support or online legal advice
C. All the steps involved in trade, such as on-line marketing ordering payment and support for delivery.
D. All of the above

Q.4. Which of the following is the largest community in classification of e-commerce?

A. Business to Business (B2B)                                                                    B. Business to Consumer (B2C)
C. Business to Government (B2G)                                                                 D. Government to Government (G2G)

Q.5. Which of the following is not the example of business to consumer (B2C) e-commerce?

A. Amazon.com                                                      B. e-bay.com
C. dell.com                                                        D. lastminute.com

Q.6. Which of the following are the benefits of E-marketing?     i) Speed ii) Reach and Penetration iii) Ease and Efficiency iv) Low Cost v) Targeted audience

A. i, ii, iii and iv only                                                                  B. ii, iii, iv and v only
C. i, iii, iv and v only                                                                  D. All i, ii, iii, iv and v

Q.7. The types of Business to Business e-commerce are ------------

A. Direct selling and support to Business                                                           B. Industry portals
C. Information sites about a industry                                                            D. All of the above

Q.8. Sniffers can be deployed in----------

A. Wired environment                                                                      B. Ethernet LAN
C. WiFi                                                                 D. All of the above

Q.9. Which of the following are the solutions to network security?       i) Encryption   ii) Authentication   iii) Authorization   iv) Non-repudiation

A. i, ii and iii only B) C) D)                                                                         B. ii, iii and iv only
C. i, iii and iv only                                                                           D. All i, ii, iii and iv

Q.10. --------- is to protect data and passwords.

A. Encryption                                                   B. Authentication
C. Non-repudiation                                                    D. Authorization

Q.11. What is the solution for availability of data?

A. Integrity                                                                                     B. Encryption
C. Backup                                                                                    D. None of the above

Q.12. Which method is used for Integrity of data?

A. Encryption                                                                           B. Cryptography
C. Steganography                                                      D. E-Commerce

Q.13. The-------- method is used for hiding information.

A. Cryptography                                                                           B. Integrity
C. Steganography                                                        D. Confidentiality

Q.14. Computer forensics is also known as ---------

A. Cyber forensics
B. E-commerce
C. Cryptography
D. Dictionary Attack

Q.15. Dictionary attack is the type of --------- attack.

A. Passive                                                           B. Hijack
C. Phishing                                                      D. Password