Information Technology Objectives: Multiple Choice Questions
Information Technology Objectives: Multiple Choice Questions
75) _____ refers to techniques for ensuring that data stored in a computer cannot be read or
compromised by any individuals without authorization.
(a) Data Security.
(b) Computer Security.
(c) Physical Security.
76) _____ is ensuring that information is not unauthorized persons.
(a) Confidentiality.
(b) Integrity.
(c) Authentication.
77) _____ is ensuring that information is not altered by unauthorized persons in a way that is not
detectable by authorized users.
(a) Confidentiality.
(b) Integrity.
(c) Authentication.
78) _____ is ensuring that the originators of messages cannot deny that they in fact sent the
messages.
(a) Confidentiality.
(b) Integrity.
(c) Non-repudiation.
79) _____ is ensuring that a system is operational and functional at a given moment.
(a) Confidentiality.
(b) Availability.
(c) Non-repudiation.
80) What is the name of the Act that governs Internet usage in India _____.
(a) IT Act 2000.
(b) IT Act 1999.
(c) Cyber Law Act 2001.
(d) Information Act 2000.