Sunteți pe pagina 1din 7

http://examradar.

com/cyber-security-mcq-set-2/

1 The ability to recover and read deleted or damaged files from a criminals
computer is an example of a law enforcement specialty called-----------.
a. Robotics
b. Simulation
c. Computer Forensics
d. Animation

2 The main purpose of data protection act is to-----------.


a. Protect personal privacy
b. Prevent Viruses
c. Increase the security of computer systems
d. Reduce Project Failures

3 ----------is the following is an anti-virus program


a. Norton
b. K7
c. Quick heal
d. All of these
4 ----------- of the following is the examples of privacy threats.
a. Hackers
b. Virus
c. Spam
d. Worm
5 ---------- monitors user activity on internet and transmit that information in the
background to someone else.
a. Malware
b. Spyware
c. Adware
d. None of these
6 Firewall is a type of -------------.
a. Virus
b. Security threat
c. Worm
d. None of these
7Unsolicited commercial email is known as --------------.
a. Spam
b. Malware
c. Virus
d. Spyware
8-------------of the following is not an external threat to a computer or a computer
network
a. Ignorance
b. Trojan Horse
c. Adware
d. Crackers
9When a person is harassed repeatedly by being followed, called or be written to
he/she is a target of ---------.
a. Bullying
b. Stalking
c. Identity theft
d. Phishing
10Exploring appropriate and ethical behaviours related to online environment and
digital media is --------------.
a. Cyber ethics
b. Cyber security
c. Cyber safety
d. Cyber law
11-------------is the following is digital certificate standard
a. X.508
b. X.509
c. D.509
d. A.508
12------------ of the following technique is used to verify the integrity of the
message.
a. Message digest
b. Digital signature
c. Decryption algorithm
d. Protocol
13------------of the following principle is violated if the computer system is not
accessible.
a. Confidentiality
b. Availability
c. Access control
d. Authentication
14The certificate authority signs the digital certificate with
a. User’s public key
b. User’s private key
c. It’s own public key
d. It’s own private key
15Transmit time and response time measure the ---------- of the network.
a. Performance
b. Reliability
c. Security
d. Longevity
16 Network failure is primarily a ---------- issue
a. Performance
b. Reliability
c. Security
d. None of these
17------------- is a network reliability issue
a. The number of users
b. The type of transmission medium
c. The frequency of failure
d. Unauthorized access
18 Encryption technique improve a network’s ------------
a. Performance
b. Reliability
c. Security
d. Longevity
19----------- security tradeoff occurs while using IDS(Intrusion Detection System)
a. Change in permission
b. Login failures
c. Change in privilege
d. Performance degradation
20EDI (Electronic Data Interchange) use -----------.
a. Requires an extranet
b. Requires value added network
c. Can be done on internet
d. Requires a corporate
21EDI(Electronic Data Interchange) over internet uses ------------.
a. MIME to attach EDI forms to e-mail message
b. FTP to send business forms
c. HTTP to send business forms
d. SGML to send business forms
22 For secure EDI(Electronic Data Interchange) transmission on internet-------- is
used.
a. MIME
b. S/MIME
c. PGP
d. All of these
23A firewall may be implemented in -----------.
a. Routers which connect intranet to internet
b. Bridge used in an intranet
c. Expensive modem
d. User’s application program
24Firewall as part of a router program filters-----------.
a. Only packets coming from internet
b. Only packets going to internet
c. Packets travelling from and to the intranet from the internet
d. Packets for speedy e-commerce
25Main function of proxy application gateway firewall is
a. To allow corporate users to use efficiently all internet services
b. To allow intranet users to securely use specified internet services
c. To allow corporate users to use all internet services
d. To prevent corporate users from using internet services
By symmetric key encryption we mean------------.
a. A one private key is used for both encryption and decryption
b. Private and public key used are symmetric
c. Only public keys are used for encryption
d. Only symmetric key is used for encryption and decryption
----------- of the following are possible security threats
a. Illegitimate use
b. Backdoors
c. Masquerading
d. All of the above
----------- of the following involves submitting as many requests as possible to a
single internet computer or service, overloading it and preventing it from servicing
legitimate requests.
a. Distributed Denial of Service attacks
b. Backdoor
c. Masquerading
d. Phishing
------------ of the following are the basic functionalities of the IPsec protocol
a. Security association for policy management and traffic processing
b. Security protocols for AH and ESP
c. Manual and automatic key management for the internet key exchange
d. All of the above
------------ of the following refers to programs that surreptitiously monitor activity
on a computer system and report that information to others without the user’s
consent.
a. Malware
b. Botnet
c. Trojan horse
d. Spyware
----------- is a computer worm
a. It is a software designed to exploit networks
b. It is software designed to analyze and search for open ports
c. It is a software utilized to scan packets on open networks
d. It is malware designed to infect other computers
------------ and ----------- protocols use Port 443 and Port 80 respectively
a. HTTPS and HTTP
b. XHTML
c. HTTP and HTTPS
d. DHTML
Cross site scripting allow ------------ for attackers.
a. Direct introduction of viruses into a victim computer
b. The introduction of worm viruses into the victim website
c. A phishing attack that automatically downloads the victims personal
information
d. Injection of client-side scripts into web pages
TLS and SSL are ----------.
a. Internet protocols
b. Network layers
c. Internet layers
d. Cryptographic protocols
An SQL injection is often used to attack -------------.
a. Small scale ATMs
b. Large scale databases such as credit card information
c. Servers running SQL databases
d. Servers built on NoSQL
According to OWASP ------------ is the most dangerous web vulnerability.
a. Injections(SQL, LDAP)
b. Cross-site- scripting(XSS)
c. Security Misconfiguration
d. Cross- Site Request Forgery(CSRF)
------------ is the function of MTA(Mail Transfer Agent).
a. It helps in reading the emails
b. It receives and delivers the messages
c. It resolves the names
d. It detects emails carrying virus
------------- is DHA
a. Directory Harvest Attack
b. DNS Harvest Attack
c. Direct Harvest Attack
d. Dictionary Harvest Attack
------keys are required if two parties communicate using Symmetric Cryptography.
a. One
b. Two
c. Three
d. Four
---------- is S/MIME
a. Secure Multipurpose Intranet Mail Extension
b. Secure Multipurpose Internet Mail Extension
c. Secure Multipurpose Intranet Message Extension
d. Secure Multipurpose Internet Message Extension
FAT stands for --------
a. File allocation table
b. Fat allocation table
c. Folder Allocation table
d. File Authentication Table
------------ is not a proper method for email security.
a. Use strong password
b. Use email encryption
c. Spam filters and malware scanners
d. Click on unknown links to explore
------------ is a famous technological medium for the spread of malware, spam and
attacks
a. CD Drive
b. Pen Drive
c. Website
d. None of these

S-ar putea să vă placă și