InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
One common way to maintain data availability is __________(a) Data clustering(b) Data backup(c) Data recovery(d) Data AlteringI have been asked this question in a national level competition.This intriguing question comes from Elements of Security topic in section Cyber Security of Cyber Security |
|
Answer» Right option is (b) DATA backup |
|
| 2. |
______ is the latest technology that faces an extra challenge because of CIA paradigm.(a) Big data(b) Database systems(c) Cloud storages(d) Smart dustI have been asked this question in an interview.My question is taken from Elements of Security topic in division Cyber Security of Cyber Security |
|
Answer» The CORRECT choice is (a) Big data |
|
| 3. |
Data integrity gets compromised when _____ and_____ are taken control off.(a) Access control, file deletion(b) Network, file permission(c) Access control, file permission(d) Network, systemI have been asked this question in an online quiz.This is a very interesting question from Elements of Security in portion Cyber Security of Cyber Security |
|
Answer» The CORRECT choice is (c) Access control, file permission |
|
| 4. |
Data ___________ is used to ensure confidentiality.(a) Encryption(b) Locking(c) Deleting(d) BackupThis question was addressed to me in an interview.My query is from Elements of Security in chapter Cyber Security of Cyber Security |
|
Answer» Correct choice is (a) ENCRYPTION |
|
| 5. |
Which of these is not a proper method of maintaining confidentiality?(a) Biometric verification(b) ID and password based verification(c) 2-factor authentication(d) switching off the phoneThis question was addressed to me in exam.This key question is from Elements of Security topic in portion Cyber Security of Cyber Security |
|
Answer» Correct option is (d) switching off the phone |
|
| 6. |
This helps in identifying the origin of information and authentic user. This referred to here as __________(a) Confidentiality(b) Integrity(c) Authenticity(d) AvailabilityI have been asked this question in a job interview.The origin of the question is Elements of Security in chapter Cyber Security of Cyber Security |
|
Answer» Right choice is (c) Authenticity |
|
| 7. |
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?(a) They help understanding hacking better(b) They are key elements to a security breach(c) They help understands security and its components better(d) They help to understand the cyber-crime betterI have been asked this question by my school principal while I was bunking the class.Query is from Elements of Security in division Cyber Security of Cyber Security |
|
Answer» The correct answer is (C) They HELP understands security and its COMPONENTS better |
|
| 8. |
_______ of information means, only authorised users are capable of accessing the information.(a) Confidentiality(b) Integrity(c) Non-repudiation(d) AvailabilityI had been asked this question in a job interview.My query is from Elements of Security in chapter Cyber Security of Cyber Security |
|
Answer» The correct OPTION is (d) Availability |
|
| 9. |
When integrity is lacking in a security system, _________ occurs.(a) Database hacking(b) Data deletion(c) Data tampering(d) Data leakageThe question was asked in semester exam.I'm obligated to ask this question of Elements of Security in portion Cyber Security of Cyber Security |
|
Answer» The correct answer is (c) DATA tampering |
|
| 10. |
When you use the word _____it means you are protecting your data from getting disclosed.(a) Confidentiality(b) Integrity(c) Authentication(d) AvailabilityI have been asked this question in an international level competition.Enquiry is from Elements of Security in section Cyber Security of Cyber Security |
|
Answer» Right option is (a) Confidentiality |
|
| 11. |
______ means the protection of data from modification by unknown users.(a) Confidentiality(b) Integrity(c) Authentication(d) Non-repudiationI got this question in final exam.My question comes from Elements of Security topic in section Cyber Security of Cyber Security |
|
Answer» Right answer is (b) INTEGRITY |
|
| 12. |
CIA triad is also known as ________(a) NIC (Non-repudiation, Integrity, Confidentiality)(b) AIC (Availability, Integrity, Confidentiality)(c) AIN (Availability, Integrity, Non-repudiation)(d) AIC (Authenticity, Integrity, Confidentiality)This question was addressed to me by my school teacher while I was bunking the class.The above asked question is from Elements of Security in chapter Cyber Security of Cyber Security |
|
Answer» Correct OPTION is (b) AIC (AVAILABILITY, Integrity, Confidentiality) |
|
| 13. |
This is the model designed for guiding the policies of Information security within a company, firm or organization. What is “this” referred to here?(a) Confidentiality(b) Non-repudiation(c) CIA Triad(d) AuthenticityI got this question during an interview.My question is from Elements of Security topic in section Cyber Security of Cyber Security |
|
Answer» Right choice is (c) CIA Triad |
|
| 14. |
According to the CIA Triad, which of the below-mentioned element is not considered in the triad?(a) Confidentiality(b) Integrity(c) Authenticity(d) AvailabilityThe question was asked during an internship interview.This interesting question is from Elements of Security in division Cyber Security of Cyber Security |
|
Answer» The correct choice is (c) Authenticity |
|
| 15. |
In general how many key elements constitute the entire security structure?(a) 1(b) 2(c) 3(d) 4This question was posed to me in an online quiz.The question is from Elements of Security in portion Cyber Security of Cyber Security |
|
Answer» CORRECT option is (d) 4 For EXPLANATION: The 4 key ELEMENTS that constitute the security are: confidentiality, integrity, authenticity & availability. Authenticity is not considered as ONE of the key elements in some other security models, but the popular CIA Triad eliminates this as authenticity at times comes under confidentiality & availability. |
|