Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

One common way to maintain data availability is __________(a) Data clustering(b) Data backup(c) Data recovery(d) Data AlteringI have been asked this question in a national level competition.This intriguing question comes from Elements of Security topic in section Cyber Security of Cyber Security

Answer»

Right option is (b) DATA backup

Explanation: For PREVENTING data from data-loss, or damage data backup can be done and stored in a different geographical location so that it can sustain its data from natural DISASTERS & UNPREDICTABLE events.

2.

______ is the latest technology that faces an extra challenge because of CIA paradigm.(a) Big data(b) Database systems(c) Cloud storages(d) Smart dustI have been asked this question in an interview.My question is taken from Elements of Security topic in division Cyber Security of Cyber Security

Answer»

The CORRECT choice is (a) Big data

Explanation: Big data has additional challenges that it has to face because of the tremendous volume of data that NEEDS protection as well as other key elements of the CIA triad, which MAKES the entire PROCESS costly and time-consuming.

3.

Data integrity gets compromised when _____ and_____ are taken control off.(a) Access control, file deletion(b) Network, file permission(c) Access control, file permission(d) Network, systemI have been asked this question in an online quiz.This is a very interesting question from Elements of Security in portion Cyber Security of Cyber Security

Answer»

The CORRECT choice is (c) Access control, file permission

Easiest explanation: The two KEY ingredients that NEED to be kept SAFE are: access control & file permission in ORDER to preserve data integrity.

4.

Data ___________ is used to ensure confidentiality.(a) Encryption(b) Locking(c) Deleting(d) BackupThis question was addressed to me in an interview.My query is from Elements of Security in chapter Cyber Security of Cyber Security

Answer»

Correct choice is (a) ENCRYPTION

The explanation: Data encryption is the METHOD of converting plain text to cipher-text and only AUTHORISED users can decrypt the MESSAGE back to plain text. This preserves the confidentiality of data.

5.

Which of these is not a proper method of maintaining confidentiality?(a) Biometric verification(b) ID and password based verification(c) 2-factor authentication(d) switching off the phoneThis question was addressed to me in exam.This key question is from Elements of Security topic in portion Cyber Security of Cyber Security

Answer»

Correct option is (d) switching off the phone

The explanation: Switching off the phone in the fear of PRESERVING the confidentiality of data is not a proper SOLUTION for data confidentiality. Fingerprint detection, face RECOGNITION, password-based AUTHENTICATION, two-step verifications are some of these.

6.

This helps in identifying the origin of information and authentic user. This referred to here as __________(a) Confidentiality(b) Integrity(c) Authenticity(d) AvailabilityI have been asked this question in a job interview.The origin of the question is Elements of Security in chapter Cyber Security of Cyber Security

Answer»

Right choice is (c) Authenticity

The explanation: The KEY ELEMENT, authenticity helps in assuring the fact that the information is from the ORIGINAL source.

7.

Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?(a) They help understanding hacking better(b) They are key elements to a security breach(c) They help understands security and its components better(d) They help to understand the cyber-crime betterI have been asked this question by my school principal while I was bunking the class.Query is from Elements of Security in division Cyber Security of Cyber Security

Answer»

The correct answer is (C) They HELP understands security and its COMPONENTS better

The explanation is: The four elements of security viz. confidentiality, integrity, AUTHENTICITY & availability helps in better understanding the pillars of security and its DIFFERENT components.

8.

_______ of information means, only authorised users are capable of accessing the information.(a) Confidentiality(b) Integrity(c) Non-repudiation(d) AvailabilityI had been asked this question in a job interview.My query is from Elements of Security in chapter Cyber Security of Cyber Security

Answer»

The correct OPTION is (d) Availability

Easy explanation: Information seems useful only when RIGHT people (authorised USERS) access it after GOING through proper authenticity check. The key element availability ENSURES that only authorised users are able to access the information.

9.

When integrity is lacking in a security system, _________ occurs.(a) Database hacking(b) Data deletion(c) Data tampering(d) Data leakageThe question was asked in semester exam.I'm obligated to ask this question of Elements of Security in portion Cyber Security of Cyber Security

Answer»

The correct answer is (c) DATA tampering

The best explanation: The term data tampering is used when integrity is compromised in any security model and checking its integrity later becomes costlier. Example: let SUPPOSE you sent $50 to an authorised person and in between a Man in the Middle (MiTM) attack takes place and the VALUE has tampered to $500. This is how integrity is compromised.

10.

When you use the word _____it means you are protecting your data from getting disclosed.(a) Confidentiality(b) Integrity(c) Authentication(d) AvailabilityI have been asked this question in an international level competition.Enquiry is from Elements of Security in section Cyber Security of Cyber Security

Answer»

Right option is (a) Confidentiality

To elaborate: Confidentiality is what every individual prefer in terms of physical privacy as WELL as digital privacy. This term means our information needs to be protected from getting DISCLOSE to UNAUTHORISED PARTIES, for which we use different security mechanisms like password protection, biometric security, OTPs (One TIME Passwords) etc.

11.

______ means the protection of data from modification by unknown users.(a) Confidentiality(b) Integrity(c) Authentication(d) Non-repudiationI got this question in final exam.My question comes from Elements of Security topic in section Cyber Security of Cyber Security

Answer»

Right answer is (b) INTEGRITY

To elaborate: A information only seems valuable if it is CORRECT and do not get modified during its journey in the course of ARRIVAL. The element integrity makes sure that the data SENT or generated from other END is correct and is not modified by any unauthorised party in between.

12.

CIA triad is also known as ________(a) NIC (Non-repudiation, Integrity, Confidentiality)(b) AIC (Availability, Integrity, Confidentiality)(c) AIN (Availability, Integrity, Non-repudiation)(d) AIC (Authenticity, Integrity, Confidentiality)This question was addressed to me by my school teacher while I was bunking the class.The above asked question is from Elements of Security in chapter Cyber Security of Cyber Security

Answer»

Correct OPTION is (b) AIC (AVAILABILITY, Integrity, Confidentiality)

For explanation I would SAY: This approach of naming it CIA Triad as AIC (Availability, Integrity, Confidentiality) Triad because PEOPLE get confused about this acronym with the abbreviation and the secret agency name Central Intelligence Agency.

13.

This is the model designed for guiding the policies of Information security within a company, firm or organization. What is “this” referred to here?(a) Confidentiality(b) Non-repudiation(c) CIA Triad(d) AuthenticityI got this question during an interview.My question is from Elements of Security topic in section Cyber Security of Cyber Security

Answer»

Right choice is (c) CIA Triad

Explanation: Various security models were being developed till DATE. This is by far the most popular and widely USED model which focuses on the information’s confidentiality, integrity as well as availability and how these KEY elements can be PRESERVED for a BETTER security in any organization.

14.

According to the CIA Triad, which of the below-mentioned element is not considered in the triad?(a) Confidentiality(b) Integrity(c) Authenticity(d) AvailabilityThe question was asked during an internship interview.This interesting question is from Elements of Security in division Cyber Security of Cyber Security

Answer»

The correct choice is (c) Authenticity

Easiest explanation: According to the CIA triad the three components that a security NEED is the CONFIDENTIALITY, Integrity, AVAILABILITY (as in short READ as CIA).

15.

In general how many key elements constitute the entire security structure?(a) 1(b) 2(c) 3(d) 4This question was posed to me in an online quiz.The question is from Elements of Security in portion Cyber Security of Cyber Security

Answer» CORRECT option is (d) 4

For EXPLANATION: The 4 key ELEMENTS that constitute the security are: confidentiality, integrity, authenticity & availability. Authenticity is not considered as ONE of the key elements in some other security models, but the popular CIA Triad eliminates this as authenticity at times comes under confidentiality & availability.