Cyber Security Questions and Answers - Information Security Technologies
Cyber Security Questions and Answers - Information Security Technologies
This set of Cyber Security Multiple Choice Questions & Answers (MCQs) focuses on “Information Security Technologies”.
1. _______ is the practice and precautions taken to protect valuable information from unauthorised access, recording,
disclosure or destruction.
a) Network Security
b) Database Security
c) Information Security
d) Physical Security
View Answer
Answer: c
Explanation: Information Security (abbreviated as InfoSec) is a process or set of processes used for protecting valuable
information for alteration, destruction, deletion or disclosure by unauthorised users.
advertisement
2. From the options below, which of them is not a threat to information security?
a) Disaster
b) Eavesdropping
c) Information leakage
d) Unchanged default password
View Answer
Answer: d
Explanation: Disaster, eavesdropping and information leakage come under information security threats whereas not
changing the default password of any system, hardware or any software comes under the category of vulnerabilities that
the user may pose to its system.
3. From the options below, which of them is not a vulnerability to information security?
a) ood
b) without deleting data, disposal of storage media
c) unchanged default password
d) latest patches and updates not done
View Answer
Answer: a
Explanation: Flood comes under natural disaster which is a threat to any information and not acts as a vulnerability to any
system.
4. _____ platforms are used for safety and protection of information in the cloud.
a) Cloud workload protection platforms
b) Cloud security protocols
c) AWS
d) One Drive
View Answer
Answer: a
Explanation: Nowadays data centres support workloads from di erent geographic locations across the globe through
physical systems, virtual machines, servers, and clouds. Their security can be managed using Cloud workload protection
platforms which manage policies regarding security of information irrespective of its location.
5. Which of the following information security technology is used for avoiding browser-based hacking?
a) Anti-malware in browsers
b) Remote browser access
c) Adware remover in browsers
d) Incognito mode in a browser
View Answer
Answer: b
Explanation: Cyber-criminals target browsers for breaching information security. If a user establishes a remote browsing
by isolating the browsing session of end user, cyber-criminals will not be able to infect the system along with browser with
malware, ultimately reducing the attack surface area.
advertisement
6. The full form of EDR is _______
a) Endpoint Detection and recovery
b) Early detection and response
c) Endpoint Detection and response
d) Endless Detection and Recovery
View Answer
Answer: c
Explanation: It is a collective name for tools that monitor networks & endpoints of systems and record all the activities for
further reporting, analysis & detection in a central database. Analyzing the reports generated through such EDR tools,
loopholes in a system or any internal, as well as external breaching attempts can be detected.
7. _______ technology is used for analyzing and monitoring tra c in network and information ow.
a) Cloud access security brokers (CASBs)
b) Managed detection and response (MDR)
c) Network Security Firewall
d) Network tra c analysis (NTA)
View Answer
Answer: d
Explanation: Network tra c analysis (NTA) is an approach of information security for supervising the tra c in any network,
a ow of data over the network as well as malicious threats that are trying to breach the network. This technological
solution also helps in triage the events detected by Network Tra c Analysing tools.
View Answer
Answer: b
Explanation: Threats are anything that may cause damage or harm to a computer system, individual or any information.
Compromising of con dential information means extracting out sensitive data from a system by illegal manner.
View Answer
Answer: c
Explanation: Access control policies are incorporated to a security system for restricting of unauthorised access to any
logical or physical system. Every security compliance program must need this as a fundamental component. Those
systems which lack this feature is vulnerable.
advertisement
View Answer
Answer: d
Explanation: When there lies a threat to any system, safeguards can be implemented, outsourced, distributed or
transferred to some other system, protected using security tools and techniques but cannot be ignored.
To practice all areas of Cyber Security, here is complete set of 1000+ Multiple Choice Questions and Answers.
Participate in the Sanfoundry Certi cation contest to get free Certi cate of Merit. Join our social networks below and stay
updated with latest contests, videos, internships and jobs!
advertisement
Recommended Posts:
1. MySQL Database Questions and Answers
2. Software Engineering Questions & Answers
3. Biomedical Instrumentation Questions and Answers
4. Wireless & Mobile Communications Questions & Answers
5. Master of Computer Applications Questions and Answers
6. IOT Questions and Answers
7. Digital Communication Questions and Answers
8. MongoDB Questions and Answers
9. Home
10. Computer Fundamentals Questions and Answers
11. Operating System Questions and Answers
12. Computer Networks Questions and Answers
13. Privacy Policy
14. Cloud Computing Questions and Answers
15. Computer Science Questions and Answers
16. Programming Questions and Answers
17. Cryptography and Network Security Questions and Answers
18. Information Science Questions and Answers
19. Information Technology Questions and Answers
20. Cyber Security Questions and Answers
advertisement
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry.
Developer & SAN Architect and is passionate about competency developments in these areas. He lives in
Bangalore and delivers focused training sessions to IT professionals in Linux Kernel, Linux Debugging,
Linux Device Drivers, Linux Networking, Linux Storage, Advanced C Programming, SAN Storage
Technologies, SCSI Internals & Storage Protocols such as iSCSI & Fiber Channel. Stay connected with him
@ LinkedIn
Name*
Email*
Subscribe
About | Certi cations | Internships | Jobs | Privacy Policy | Terms | Copyright | Contact