Security in Computing - Practice MCQ Questions
Multiple Choice Questions
4 Pages
HDM
Contributed by
Himanshu David Mody
Loading
- sr noQuestionOption _aOpton _bOption _cOption_d1Which attack doesn’t allow a person who islegitimate or authenticated and authorizedto use a service?Virus BUGS Trojan horse Denial of service attack(dos)2 What is Portability?Can be used on multipleplatforms or can be transmitted /transferred across. Cannot be transmitted.Cannot be used on multipleplatofrmsIs at a fixed place and it cannot betransferred.3 What is Deterrence?The action of discouraging anevent or action by instilling fearor doubt of the consequences. Having no opinions at allThe action that leads to noconsequences. The action of encouraging everything.4What are the laws that cover networkintrusions that results in theft,fraud ordamage are referred as?Public laws Hacking laws Private laws Key laws5What is Assessment in building a security program ?Assessing what needs to beprotected,why and how it leadsto a strategy for improving thesecurity posture.Assessing the techniques.Assessment is not required tobuild a security program.Assessment is only for documentationalpurposes.6 What is the formal Definition of Risk?RISK= Probablity(Threat+Exploit of vulnerability) * Cost of the Asset damagedRISK= Profit(Threat+theft) * Cost of the AssetRISK= Loss(Threat+theft) * Cost of the AssetRISK= Profit(vulnerabilityt+theft) * Asset7 What is Confidentiality?Restriction to access for all theusers. No Restriction of access.Restriction of access to data onlyto those who are authorised touse it.Restriction of access to data to thosewho are not authorised to use it8 What is a threat vector? No threats exists. Where a threat can't be found.Where a threat originates andthe path it takes to reach atarget.Where a Threat orginates and endsthere.9 What are Preventive controls?Preventive controls donot blockthe vulnerability.Preventive controls blocks thesecurity threats before they canexploit a vulnerability.Preventive controls block thesecurity threat after they haveexploited the vulnerability.Preventive controls donot block thesecurity threats.10 What are Trojans or Trojan horse pograms? Self replicatingDepends on another code to infectposes as a legetimate program and are activated by an unsuspecting user.like man-in-the-middle attack11In which process,the user makes a provableclaim about individual identity or anentity's identity?Authentication Encryption Availability Authorization12which is an open standard for Token-basedauthentication and authorization on theinternet?HTTP basic Open authorization API key one-time password13ARP Stands for…. Attacker resolution protocol Address Result protocol Attacker result protocol Address Resolution Protocol14 How does ARP Poisoning work?ARP Poisoining works byresponding to the ARP packets.ARP Poisoining works byresponding to the ARP requestswith Attackers MAC address.ARP Poisoining works byresponding to the ARP requestswith Attackers PORT NUMBER..ARP Poisoining works by responding tothe ARP requests with systems portnumber.TYBScIT Sem VI Subject : Security in ComputingSample Questions For Self Practice
Page 1
- sr noQuestionOption _aOpton _bOption _cOption_dTYBScIT Sem VI Subject : Security in ComputingSample Questions For Self Practice15which backup consists of copying all of thedata that has changed since the last fullbackup?Differential Full Transaction log Incremental16What is an Alternative term for Onion Model?Defense in depth Dynamic defense Defense in Domain Domain in defense17 What is perimeter security?It involves building virtual orphysical wall around objects ofno importance.It involves building virtual orphysical wall around no objectsIt involves building virtual orphysical wall around objects ofvalue.It involves building virtual or physicalwall around objects of no great value18Who signs the digital certificate by using itsprivate key?Cryptographer Certification Authority Sender Receiver19Which range of networks uses DSSS? 802.11 802.15 803 both b & c20Which way is correct to control your wireless signal spread ?Antenna positioning Order sequence transmitting power21A radio transceiver can only transmit or receive at a given time on a given frequency, allfull duplex simplex half duplex complex22To send a packet, the source should know the which of the following addresses ?MAC Address IP address DNS Both IP address and MAC Address23Virtual terminal protocol supports whichlayer?Application Physical Data link Presentation24Controlling access to network by analyzingincoming and outgoing packets is called asIP Filtering Data Filtering Packet Filtering Firewall Filtering25Network layer firewall works as a which typeof filter ?Frame filter Packet filter Content filter Virus filter26_______ checks the access list that the authenticated person has.Service Authorization Authentication Management27_____ is the method by which plaintext is converted from a readable form to an encoded version.Encryption Decryption Fabrication Integrity28_____ is a method of protecting Information and communications through the use of codes so that only those for whom the information is intended can read and process it.Cryptography Confidentiality Availability Encoding29Data travels on the internet in small pieces;these are called ?metadata packets Protocols Virus filter30As such, Bluetooth is very resistant to whichinterference unless the interfering signalcovers the whole middle ISM band?microwave radio infrared media31Which range of networks uses DSSS?802.11 802.15 803 both b & c32The infrastructure used to support certificates in an organization is called as ______.Public Key Infrastructure Public Key architecture Public Key Interface Private Key Encryption33_____ is a certificate-based system that is used to provide authentication of secure web servers and clients and to share encryption keys between servers and clients.Transport Layer Security Secure Socket Layer Digital certificate Kerberos34____ security mechanism used to authenticate and provide access to a facility or system based on the automatic and instant verification of an individual's physical characteristics.Tansport layer Password Biometric Secure Socket layer35_____ management is security feature controlling which resources a user can access and what actions a user can perform on those resources.Role-based Authorization User rights Data Storage Risk36____ is a table that tells a computer operating system which access rights each user has to a particular system object such as a file directory or individual file.Access Control List Role based Authorization model Digital certificate Kerberos37____ authorization requires the development of rules that stipulate what a specific user can do on a system.Role-based Password-based Rule-based Certificate-based38Data travels on the internet in small pieces; these are called ?metadata packets Protocols Virus filter
Page 2
- sr noQuestionOption _aOpton _bOption _cOption_dTYBScIT Sem VI Subject : Security in ComputingSample Questions For Self Practice39Which firewalls do not just look at the metadata; they also look at the actual data transported?Packet filtering Application-layer Stateful packet Network Layer40What WLAN device provides communications management services to wireless workstations?Antenna Network adapter Repeater Access point41DSSS system spreads the baseband signal by performing what to the baseband pulses with a pseudo noise sequence.Adding Subtracting Multiplying Dividing42IPSs are proactive, and a false positive means a legitimate service or ___________ is being deniedguest session host network43Central to the ____ field are the definitions of management console and agentguest session host IDS44Many __________ systems are server-based and rely on common operating systems (mainly Windows and Linux) to run their hardware interfacepop VoIP smtp snmp45The ___________ element (the “brains” of the operation) of a VoIP system can be either a purposed appliance, a piece of software that runs on a common or specialized server operating systemhost control network control call control communication control46____ is the mechanism an array uses to present its storage to a host operating system.Serial Number Packet number Logical unit number certificate id47Which of these are the updates released bythe product vendor which should be appliedin a timely manner?Patches Updates Instants Data48What is DoS stands for?Defense of Service Denial of service Duty of service delay of service49which is the process of monitoring for andidentifying specific malicious traffic ?traffic controller intrusion controller traffic detection Intrusion detection (ID)50which segment can be defined as a singlelogical packet domain?session data transport network51Which are the two sub categories of Network layer firewall ?State full firewall and statelessfirewallBit oriented firewall and byteoriented firewall Frame firewall and packet firewallNetwork layer firewall and session layerfirewall52Which of the following is / are the types of firewall?Packet Filtering Firewall Dual Homed Gateway Firewall Screen Host Firewall Dual Host Firewall53A proxy firewall filters at which layer ? Physical layer Data link layer Network layer Application layer54A packet filter firewall filters at which layer ? Physical layer Data link layer Network layer or Transport layer Application layer55What was proposed in 1985 by notedsecurity laureate Dr. Dorothy E. Denning,and it works by establishing acceptedbaselines and noting exceptionaldifferences?Module Anomaly detection Model Anomaly detection modern anamoly detection memory anomaly detection56Central to which field are the definitions ofmanagement console and agent ?guest session host IDS57which systems are server-based and rely oncommon operating systems (mainlyWindows and Linux) to run their hardwareinterface ?pop VoIP smtp snmp58A radio transceiver can only transmit or receive at a given time on a given frequency, allfull duplex simplex half duplex complex59To send a packet, the source should know the which of the following addresses ?MAC Address IP address DNS Both IP address and MAC Address60The protocol used to find the IP address when Mac address is given is?RARP ARP DNS IP61Which connection less protocol used in transport layer in OSI reference model ?TCP UDP IP RARP62The dumb device used to provide solution to connectivity in network is which one ?hub switch modem cables63which is the term for establishing aconnection with a forged sender address?spoofing threat hacking bluffing64What is always prohibitive (i.e., all that is notexpressly permitted is forbidden) and notpermissive?HTTP MAC FTP SMTP65________________ are the most popular type of IDS, and they work by using databases of known bad behaviors and patterns.Signature-detection or misuse IDSslogin detection protocol detection id detection66___________-generation IDSs are being called intrusion-prevention systems (IPSs).First Second Third Fourth67IPSs are proactive, and a false positive means a legitimate service or ___________ is being deniedguest session host network68NAS stands for Network-_________ Storage.Area Attack Attached Administrative69SAN stands for ______ Area Networks. Secure Storage Symmetric Service
Page 3
- sr noQuestionOption _aOpton _bOption _cOption_dTYBScIT Sem VI Subject : Security in ComputingSample Questions For Self Practice70Which is a compute resource that uses softwareinstead of a physical computer to run programsand deploy apps?Virtual Machine Operating system commercial softwares router71_____________ is the term for establishing a connection with a forged sender addressspoofing threat hacking bluffing72Network Topology is which type of layout and connection of network hardware?logical physical dependent connected73In networking firewall , which systems are used for controlling traffic movement around the network?authorized authentication autogenerated automatic74Who provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network.Visual Private Network Virtual Protocol Network Virtual Protocol Networking Virtual Private Network75(DACLs) stands for ___________________ directory access control lists defend access control lists discretionary access control lists data access contol lists76___________ is always prohibitive (i.e., all that is not expressly permitted is forbidden) and not permissive.HTTP MAC FTP SMTP77_______________ requires that access control policy decisions be beyond the control of the individual owners of an objecMandatory access control Memory access control matadata access control data access contol lists78__________ is often known as a reversed version of Bell-LaPadula, as it focuses on integrity labelsTCB TCSEC Biba Sun sparc79Which is computer software, firmware orhardware that creates and runs virtualmachines ?Vmware Hypervisor Hyper V Microsoft80(SRM) stands for _______________ Security Role Manager Security reference manager Security Reference Monitor Security Role monitor81A __________________ defines a standard set of security requirements for a specific type of product (for example, operating systems, databases, or firewalls).public profile private profile people profile protection profile82(EALs) stand for _____________ Enhanced assurance levels evaluation assurance levels enquiry assurance level expert assurancce level83What is SaaS?Software as a Service Software as a Security Security as a Service Service as a Security84Which of these companies is not a leader inCloud computing?Google Catalina Amazon Microsoft85Which is not the feature of Cloud Computing?High Cost Reliability Security Reduced Cost86When choosing a location for a data centeror officesite what is most important?survivability cost buget risk87Which is not characteristic of SaaS?Multi device support Web Access one to many offline access88What is the major drawback of anomalydetection IDS?These are very slow at detection It generates many false alarms It doesn’t detect novel attacks it does not generate any alarms89Which of the following is the best choice in choosing security guard for a physical access control mechanism?When intrusion detection is neededWhen discriminating judgment is requiredWhen the allotted security budget is lowWhen access controls are in place90When choosing a location for a data center or officesurvivability cost buget risk91_____________ of the site is typically the first consideration, and with good reason.Cost Accessibility Location Buget92________________ can take your entire network and communications infrastructure down with one fell swoop of a backhoe’s bucket.Construction excavation Construction and excavation construction activities93what is CCTV? Closed-circuit television Clear -circuit television Clean -circuit television Clone -circuit television94Which is not characteristic of SaaS? Multi device support Web Access one to many offline access95Which device is classified as any device thatuses distinctive personally identifiablecharacteristics?Biometric VMM Router Guards96A hypervisor, also known as a _______________________VCM VMM VMC VVM97What is NAT? Network Address Transcoder Net Address Translation Network Address Translation Network Addition Translation98DNS stand for… Dynamic network system Data name system Dynamic name system Domain Name System99What is Encryption? Process of encoding information Process of analyzing information Process of decoding information Caligraphy100What is Decryption? Process of encoding information Process of analyzing information Process of decoding information Caligraphy
Page 4
Related documents:
- Atoms and Nucleus Notes and MCQs - Notes
- Public Relationship (PR) - Principles of Event Management - Notes
- Commonwealth Literature (Option B) Question bank with Answers - Question Bank
- American Literature Question bank with Answers - Question Bank
- General English Question bank with Answers - Question Bank
- banking - Assignment
- GE8151 Problem Solving and Python Programming Notes Unit 1 -5 - Notes
- Political Science and International Relations (Paper I) 2018 Question Paper
- Sociology (Paper II) 2018 Question Paper - MCQ
- Data Mining MCQs - MCQ
- FULL TEST – I [ANSWERS, HINTS & SOLUTIONS FULL TEST –I]
- Statistics (Paper III) 2016 Question Paper - Notes
- History of English Language and Phonetics Question bank with Answers - Question Bank
- Development Of Educational Thought - Question Bank
- Political Science and International Relations (Paper I) 2015 Question Paper - Question Paper
- .Corporate Finance Fundamentals - Assignment
- Consumer Behavior MCQs - MCQ
- 1234 - Assignment
- Sociology of Indian Society – 2 - Questions with answers - Question Bank
- FOREIGN EXCHANGE RISK - INTERNATIONAL FINANCE - Notes