0% found this document useful (0 votes)
113 views

Cyber Security Questions and Answers - Information Security Technologies

Uploaded by

diggi smash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
113 views

Cyber Security Questions and Answers - Information Security Technologies

Uploaded by

diggi smash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

 

Cyber Security Questions and Answers – Information


Security Technologies
« Prev Next »

This set of Cyber Security Multiple Choice Questions & Answers (MCQs) focuses on “Information Security Technologies”.

1. _______ is the practice and precautions taken to protect valuable information from unauthorised access, recording,
disclosure or destruction.
a) Network Security
b) Database Security
c) Information Security
d) Physical Security

View Answer

Answer: c
Explanation: Information Security (abbreviated as InfoSec) is a process or set of processes used for protecting valuable
information for alteration, destruction, deletion or disclosure by unauthorised users.

advertisement


2. From the options below, which of them is not a threat to information security?
a) Disaster
b) Eavesdropping
c) Information leakage
d) Unchanged default password

View Answer

Answer: d
Explanation: Disaster, eavesdropping and information leakage come under information security threats whereas not
changing the default password of any system, hardware or any software comes under the category of vulnerabilities that
the user may pose to its system.

3. From the options below, which of them is not a vulnerability to information security?
a) ood
b) without deleting data, disposal of storage media
c) unchanged default password
d) latest patches and updates not done

View Answer

Answer: a
Explanation: Flood comes under natural disaster which is a threat to any information and not acts as a vulnerability to any
system.

4. _____ platforms are used for safety and protection of information in the cloud.
a) Cloud workload protection platforms
b) Cloud security protocols
c) AWS
d) One Drive

View Answer

Answer: a
Explanation: Nowadays data centres support workloads from di erent geographic locations across the globe through
physical systems, virtual machines, servers, and clouds. Their security can be managed using Cloud workload protection
platforms which manage policies regarding security of information irrespective of its location.

5. Which of the following information security technology is used for avoiding browser-based hacking?
a) Anti-malware in browsers
b) Remote browser access
c) Adware remover in browsers
d) Incognito mode in a browser

View Answer

Answer: b
Explanation: Cyber-criminals target browsers for breaching information security. If a user establishes a remote browsing

by isolating the browsing session of end user, cyber-criminals will not be able to infect the system along with browser with
malware, ultimately reducing the attack surface area.

advertisement
6. The full form of EDR is _______
a) Endpoint Detection and recovery
b) Early detection and response
c) Endpoint Detection and response
d) Endless Detection and Recovery

View Answer

Answer: c
Explanation: It is a collective name for tools that monitor networks & endpoints of systems and record all the activities for
further reporting, analysis & detection in a central database. Analyzing the reports generated through such EDR tools,
loopholes in a system or any internal, as well as external breaching attempts can be detected.

7. _______ technology is used for analyzing and monitoring tra c in network and information ow.
a) Cloud access security brokers (CASBs)
b) Managed detection and response (MDR)
c) Network Security Firewall
d) Network tra c analysis (NTA)

View Answer

Answer: d
Explanation: Network tra c analysis (NTA) is an approach of information security for supervising the tra c in any network,
a ow of data over the network as well as malicious threats that are trying to breach the network. This technological
solution also helps in triage the events detected by Network Tra c Analysing tools.

8. Compromising con dential information comes under _________


a) Bug
b) Threat
c) Vulnerability
d) Attack

View Answer

Answer: b
Explanation: Threats are anything that may cause damage or harm to a computer system, individual or any information.

Compromising of con dential information means extracting out sensitive data from a system by illegal manner.

9. Lack of access control policy is a _____________


a) Bug
b) Threat
c) Vulnerability
d) Attack

View Answer

Answer: c
Explanation: Access control policies are incorporated to a security system for restricting of unauthorised access to any
logical or physical system. Every security compliance program must need this as a fundamental component. Those
systems which lack this feature is vulnerable.

advertisement

10. Possible threat to any information cannot be ________________


a) reduced
b) transferred
c) protected
d) ignored

View Answer

Answer: d
Explanation: When there lies a threat to any system, safeguards can be implemented, outsourced, distributed or
transferred to some other system, protected using security tools and techniques but cannot be ignored.

Sanfoundry Global Education & Learning Series – Cyber Security.

To practice all areas of Cyber Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

Participate in the Sanfoundry Certi cation contest to get free Certi cate of Merit. Join our social networks below and stay
updated with latest contests, videos, internships and jobs!

Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest

« Prev - Cyber Security Questions and Answers – Elements of Security


» Next - Cyber Security Questions and Answers – Generic Steps for Security – 1 

advertisement
Recommended Posts:
1. MySQL Database Questions and Answers
2. Software Engineering Questions & Answers
3. Biomedical Instrumentation Questions and Answers
4. Wireless & Mobile Communications Questions & Answers
5. Master of Computer Applications Questions and Answers
6. IOT Questions and Answers
7. Digital Communication Questions and Answers
8. MongoDB Questions and Answers
9. Home
10. Computer Fundamentals Questions and Answers
11. Operating System Questions and Answers
12. Computer Networks Questions and Answers
13. Privacy Policy
14. Cloud Computing Questions and Answers
15. Computer Science Questions and Answers
16. Programming Questions and Answers
17. Cryptography and Network Security Questions and Answers
18. Information Science Questions and Answers
19. Information Technology Questions and Answers
20. Cyber Security Questions and Answers

advertisement


Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry.
Developer & SAN Architect and is passionate about competency developments in these areas. He lives in
Bangalore and delivers focused training sessions to IT professionals in Linux Kernel, Linux Debugging,
Linux Device Drivers, Linux Networking, Linux Storage, Advanced C Programming, SAN Storage
Technologies, SCSI Internals & Storage Protocols such as iSCSI & Fiber Channel. Stay connected with him
@ LinkedIn

Subscribe Sanfoundry Newsletter and Posts

Name*

Email*

Subscribe

About | Certi cations | Internships | Jobs | Privacy Policy | Terms | Copyright | Contact

     

© 2011-2020 Sanfoundry. All Rights Reserved.

You might also like