1. In which of the following protocols does a website (if accessed using the protocol) encrypt the session with a Digital Certificate?
2. Which of the following is a valid Internet Security requirement?
3. What is Internet Protocol Security?
4. Which of the following is valid difference between a Virus and a Spyware ?
5. What is a firewall?
6. Which of the following involves submitting as many requests as possible to a single Internet computer or service, overloading it and preventing it from servicing legitimate requests?
7. True of False? Malware exists which affects both Windows and Linux systems.
8. A digital signature scheme consists of which of the following typical algorithms ?
9. In which of the following fraud methods is a legitimate/legal-looking email sent in an attempt to gather personal and financial information from recipients?
10. What is one way that a web browser is vulnerable to breaching?
11. What is another name for an insecure plugin?
12. What is a computer worm?
13. Which of the following refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user's consent?
14. Which of the following is a means to access a computer program or entire computer system bypassing all security mechanisms?
15. Which of the following protocol used Port 443 and Port 80 respectively
16. Which of the following is the collective name for Trojan horses, spyware, and worms?
17. What are TLS and SSL?
18. What happens to your data when it is encrypted?
19. Modern secure password storage should implement:
20. Trojan Horse programs operate with what intent?
21. Which of the following type of attack can actively modify communications or data?
22. Which of the following keys are used to generate random numbers?
23. What is largely considered the most advanced computer virus?
24. According to OWASP what is the most dangerous web vulnerability?
25. Sandboxing does what to computer programs?
26. Which of the following enables secure and private data exchange/transfer on an unsecure public network ?
Internet Security MCQs | Topic-wise