Cyber Security MCQ

1. The __________________________enforces trade sanctions and embargoes.

Answer

Correct Answer: Office of Foreign Assets Control (OFAC)

Note: This Question is unanswered, help us to find answer for this one

2. The __________________ was created after a security breach at a state-operated data facility.

Answer

Correct Answer: California Database Security Breach Notification Act

Note: This Question is unanswered, help us to find answer for this one

3. The __________ defines stiffer penalties for prosecution of terrorist crimes.

Answer

Correct Answer: USA Patriot Act

Note: This Question is unanswered, help us to find answer for this one

4. Adolescent victims of cyberbullying are likely to _____.

Answer

Correct Answer: Experience depression

Note: This Question is unanswered, help us to find answer for this one

5. Id badges that can be detected by a proximity reader are often fitted with tiny radio ____ tags.

Answer

Correct Answer: RFID

Note: This Question is unanswered, help us to find answer for this one

6. Cas distribute public keys ________.

Answer

Correct Answer: In digital certificates

Note: This Question is unanswered, help us to find answer for this one

7. An airport security scanner is an example of a ____________ computer.

Answer

Correct Answer: Special purpose

Note: This Question is unanswered, help us to find answer for this one

8. A _____ is a downloadable image that can be used to scan a computer for malware.

Answer

Correct Answer: Rescue disc

Note: This Question is unanswered, help us to find answer for this one

9. All of the following are security risks associated with the ares system, except ________.

Answer

Correct Answer: Doctors and trainers may be restricted to viewing only partial data

Note: This Question is unanswered, help us to find answer for this one

10. The strongest technology that would assure alice that bob is the sender of a message is a(n) _____.

Answer

Correct Answer: Digital signature.

Note: This Question is unanswered, help us to find answer for this one

11. When encrypting a file, a fully punctuated passphrase should have a minimum of ____ characters.

Answer

Correct Answer: 20 characters

Note: This Question is unanswered, help us to find answer for this one

12. ____ requires effective backup strategies and flexible hardware configurations.

Answer

Correct Answer: Data recovery

Note: This Question is unanswered, help us to find answer for this one

13. ____ is used both for intrusion analysis and as part of evidence collection and analysis.

Answer

Correct Answer: Forensics

Note: This Question is unanswered, help us to find answer for this one

14. Malicious software can be hidden in a ________.

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

15. What is identification?

Answer

Correct Answer: Telling the system who you are

Note: This Question is unanswered, help us to find answer for this one

16. What is the purpose of Role Based Access Control models?

Answer

Correct Answer: To define a series of roles and assign them to subjects

Note: This Question is unanswered, help us to find answer for this one

17. What does DAC stand for?

Answer

Correct Answer: Discretionary Access Control

Note: This Question is unanswered, help us to find answer for this one

18. Who manages access controls in Mandatory Access Control models?

Answer

Correct Answer: Administrator

Note: This Question is unanswered, help us to find answer for this one

19. What is Access Control?

Answer

Correct Answer: Controlling access to resources on a computer or network system

Note: This Question is unanswered, help us to find answer for this one

search