Branch Wise MCQComputer Science McqsCyber Security 100+ MCQ & Answer Cyber Security | page-06 | Computer Course MCQ And Answer January 28, 2025 DSN MARATHI 51. Which one of the following systems cannot be considered as an example of the operating systems? A. Windows 8 B. Red Hat Linux C. BSD Linux D. Microsoft Office Answer Option : D 52. In the CIA Triad, which one of the following is not involved? A. Availability B. Confidentiality C. Authenticity D. Integrity Answer Option : C 53. In an any organization, company or firm the policies of information security come under__________ A. CIA Triad B. Confidentiality C. Authenticity D. None of the above Answer Option : A 54. Why are the factors like Confidentiality, Integrity, Availability, and Authenticity considered as the fundamentals? A. They help in understanding the hacking process B. These are the main elements for any security breach C. They help to understand the security and its components in a better manner D. All of the above Answer Option : C 55. In order to ensure the security of the data/ information, we need to ____________ the data: A. Encrypt B. Decrypt C. Delete D. None of the above Answer Option : A 56. Which one of the following is considered as the most secure Linux operating system that also provides anonymity and the incognito option for securing the user’s information? A. Ubuntu B. Tails C. Fedora D. All of the above Answer Option : B 57. Which type following UNIX account provides all types of privileges and rights which one can perform administrative functions? A. Client B. Guest C. Root D. Administrative Answer Option : D 58. Which of the following is considered as the first hacker’s conference? A. OSCON B. DEFCON C. DEVON D. SECTION Answer Option : B 59. Which of the following known as the oldest phone hacking techniques used by hackers to make free calls? A. Phreaking B. Phishing C. Cracking D. Spraining Answer Option : A 60. Name of the Hacker who breaks the SIPRNET system? A. John Draper B. Kevin Mitnick C. John von Neumann D. Kevin Poulsen Answer Option : D
51. Which one of the following systems cannot be considered as an example of the operating systems? A. Windows 8 B. Red Hat Linux C. BSD Linux D. Microsoft Office Answer Option : D
52. In the CIA Triad, which one of the following is not involved? A. Availability B. Confidentiality C. Authenticity D. Integrity Answer Option : C
53. In an any organization, company or firm the policies of information security come under__________ A. CIA Triad B. Confidentiality C. Authenticity D. None of the above Answer Option : A
54. Why are the factors like Confidentiality, Integrity, Availability, and Authenticity considered as the fundamentals? A. They help in understanding the hacking process B. These are the main elements for any security breach C. They help to understand the security and its components in a better manner D. All of the above Answer Option : C
55. In order to ensure the security of the data/ information, we need to ____________ the data: A. Encrypt B. Decrypt C. Delete D. None of the above Answer Option : A
56. Which one of the following is considered as the most secure Linux operating system that also provides anonymity and the incognito option for securing the user’s information? A. Ubuntu B. Tails C. Fedora D. All of the above Answer Option : B
57. Which type following UNIX account provides all types of privileges and rights which one can perform administrative functions? A. Client B. Guest C. Root D. Administrative Answer Option : D
58. Which of the following is considered as the first hacker’s conference? A. OSCON B. DEFCON C. DEVON D. SECTION Answer Option : B
59. Which of the following known as the oldest phone hacking techniques used by hackers to make free calls? A. Phreaking B. Phishing C. Cracking D. Spraining Answer Option : A
60. Name of the Hacker who breaks the SIPRNET system? A. John Draper B. Kevin Mitnick C. John von Neumann D. Kevin Poulsen Answer Option : D