Branch Wise MCQComputer Science McqsCyber Security 100+ MCQ & Answer Cyber Security | page-07 | Computer Course MCQ And Answer January 28, 2025 DSN MARATHI 61. ______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction. A. Network Security B. Database Security C. Information Security D. Physical Security Answer Option : C 62. _____ platforms are used for safety and protection of information in the cloud. A. Cloud workload protection platforms B. Cloud security protocols C. AWS D. One Drive Answer Option : A 63. Compromising confidential information comes under _________ A. Bug B. Threat C. Vulnerability D. Attack Answer Option : B 64. An attempt to harm, damage or cause threat to a system or network is broadly termed as _____ A. Cyber-crime B. Cyber Attack C. System hijacking D. Digital crime Answer Option : B 65. The CIA triad is often represented by which of the following? A. Triangle B. Diagonal C. Ellipse D. Circle Answer Option : A 66. Related to information security, confidentiality is the opposite of which of the following? A. Closure B. Disclosure C. Disaster D. Disposal Answer Option : B 67. _____ means the protection of data from modification by unknown users. A. Confidentiality B. Integrity C. Authentication D. Non-repudiation Answer Option : B 68. _____ of information means, only authorized users are capable of accessing the information. A. Confidentiality B. Integrity C. Non-repudiation D. Availability Answer Option : D 69. This helps in identifying the origin of information and authentic user. This referred to here as ________ A. Confidentiality B. Integrity C. Authenticity D. Availability Answer Option : C 70. platforms are used for safety and protection of information in the cloud. A. Cloud security protocols B. Cloud workload protection platforms C. One Drive D. AWS Answer Option : B
61. ______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction. A. Network Security B. Database Security C. Information Security D. Physical Security Answer Option : C
62. _____ platforms are used for safety and protection of information in the cloud. A. Cloud workload protection platforms B. Cloud security protocols C. AWS D. One Drive Answer Option : A
63. Compromising confidential information comes under _________ A. Bug B. Threat C. Vulnerability D. Attack Answer Option : B
64. An attempt to harm, damage or cause threat to a system or network is broadly termed as _____ A. Cyber-crime B. Cyber Attack C. System hijacking D. Digital crime Answer Option : B
65. The CIA triad is often represented by which of the following? A. Triangle B. Diagonal C. Ellipse D. Circle Answer Option : A
66. Related to information security, confidentiality is the opposite of which of the following? A. Closure B. Disclosure C. Disaster D. Disposal Answer Option : B
67. _____ means the protection of data from modification by unknown users. A. Confidentiality B. Integrity C. Authentication D. Non-repudiation Answer Option : B
68. _____ of information means, only authorized users are capable of accessing the information. A. Confidentiality B. Integrity C. Non-repudiation D. Availability Answer Option : D
69. This helps in identifying the origin of information and authentic user. This referred to here as ________ A. Confidentiality B. Integrity C. Authenticity D. Availability Answer Option : C
70. platforms are used for safety and protection of information in the cloud. A. Cloud security protocols B. Cloud workload protection platforms C. One Drive D. AWS Answer Option : B