Information Security MCQ
1. The concept of creating safer and more efficient equipment is called __________.
Answer
Correct Answer:
Ergonomics
Note: This Question is unanswered, help us to find answer for this one
2. The concept of competitive _________ refers to falling behind the competition.
Answer
Correct Answer:
Disadvantage
Note: This Question is unanswered, help us to find answer for this one
3. _____, a risk control strategy, eliminates risks by adding protective safeguards.
Answer
Correct Answer:
Avoidance
Note: This Question is unanswered, help us to find answer for this one
4. _____________________ are tools that filter offensive content.
Answer
Correct Answer:
Technology Protection Measures (TPM)
Note: This Question is unanswered, help us to find answer for this one
5. Every information system involves ____
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
6. If human action is required, the control is considered _______________.
Note: This Question is unanswered, help us to find answer for this one
7. The architecture of a(n) ____________________ firewall provides a dmz.
Answer
Correct Answer:
Screened Subnet
Note: This Question is unanswered, help us to find answer for this one
8. The advent of optical discs was made possible by developments in ____ technology.
Note: This Question is unanswered, help us to find answer for this one
9. The ability to detect a target computers __________ is very valuable to an attacker.
Answer
Correct Answer:
Operating system
Note: This Question is unanswered, help us to find answer for this one
10. The ____________________ port is also known as a switched port analysis (span) port or mirror port.
Answer
Correct Answer:
Monitoring
Note: This Question is unanswered, help us to find answer for this one
11. Some policies may need a(n) ____________________ indicating their expiration date.
Answer
Correct Answer:
Sunset Clause.
Note: This Question is unanswered, help us to find answer for this one
12. How your organization responds to risk reflects the value it puts on its ___________.
Note: This Question is unanswered, help us to find answer for this one
13. An internet-based crime is referred to as a(n) ____ crime.
Note: This Question is unanswered, help us to find answer for this one
14. Aes implements a block cipher called the rijndael block cipher. _________________________
Note: This Question is unanswered, help us to find answer for this one
15. A(n) _________________________ is typically carried concealed.
Answer
Correct Answer:
Identification card
Note: This Question is unanswered, help us to find answer for this one
16. A mans home is his castle is an example of: ___________
Answer
Correct Answer:
Territoriality
Note: This Question is unanswered, help us to find answer for this one
17. According to the text, a _____ is the quintessential gis.
Note: This Question is unanswered, help us to find answer for this one
18. A ______ is, traditionally, made up of a series of eight 0 and 1 values.
Note: This Question is unanswered, help us to find answer for this one
19. The two main places to filter spam are _____.
Answer
Correct Answer:
At the host itself and the server
Note: This Question is unanswered, help us to find answer for this one
20. A _________ is the likelihood that a loss will occur.
Note: This Question is unanswered, help us to find answer for this one
21. A _____ relationship exists when an association is maintained within a single entity.
Note: This Question is unanswered, help us to find answer for this one
22. Multimedia is anything that involves one or more of the following except ________.
Answer
Correct Answer:
Browsers.
Note: This Question is unanswered, help us to find answer for this one
23. Ethics are the moral attitudes or customs of a particular group. _________________________
Note: This Question is unanswered, help us to find answer for this one
24. A ___________ is used to transmit hidden information within normal network traffic.
Answer
Correct Answer:
Covert channel
Note: This Question is unanswered, help us to find answer for this one
25. A(n) ____________________ is a potential weakness in an asset or its defensive control(s).
Answer
Correct Answer:
Vulnerability
Note: This Question is unanswered, help us to find answer for this one
26. All of the following are enterprise social networks or platforms except ________.
Answer
Correct Answer:
Salesforce
Note: This Question is unanswered, help us to find answer for this one
27. __________ is the process of classifying idps alerts so that they can be more effectively managed.
Answer
Correct Answer:
Alarm filtering
Note: This Question is unanswered, help us to find answer for this one
28. __________ is a continuous process designed to keep all personnel vigilant.
Answer
Correct Answer:
Education
Note: This Question is unanswered, help us to find answer for this one
29. The __________ is the difference between an organizations observed and desired performance.
Answer
Correct Answer:
Performance gap
Note: This Question is unanswered, help us to find answer for this one
30. The senior technology officer is typically the chief ____________________ officer.
Answer
Correct Answer:
Information
Note: This Question is unanswered, help us to find answer for this one
31. Raid ____ drives can be hot swapped.
Note: This Question is unanswered, help us to find answer for this one
32. Information security policies would be ineffective without _____ and _____.
Answer
Correct Answer:
Audit; enforcement
Note: This Question is unanswered, help us to find answer for this one
33. A signature-based idps is sometimes called a(n) ____________________-based idps.
Answer
Correct Answer:
Knowledge
Note: This Question is unanswered, help us to find answer for this one
34. A famous study entitled protection analysis: final report was published in ____.
Note: This Question is unanswered, help us to find answer for this one
35. A(n) ____ attack is a hacker using a personal computer to break into a system.
Note: This Question is unanswered, help us to find answer for this one
36. _________ addresses are sometimes called electronic serial numbers or hardware addresses.
Note: This Question is unanswered, help us to find answer for this one
37. ____ may be considered a form of physical protection.
Answer
Correct Answer:
Surveillance
Note: This Question is unanswered, help us to find answer for this one
38. Idps, an acronym for ____________________ system, is a network burglar alarm.
Answer
Correct Answer:
Intrusion detection and prevention
Note: This Question is unanswered, help us to find answer for this one
39. Most digital forensic teams have a prepacked field kit, also known as a(n) ____.
Answer
Correct Answer:
Jump bag.
Note: This Question is unanswered, help us to find answer for this one
40. A(n) ____ attack is a method of combining attacks with rootkits and back doors.
Note: This Question is unanswered, help us to find answer for this one
41. ____ is a common indicator of a dos attack.
Answer
Correct Answer:
User reports of system unavailability
Note: This Question is unanswered, help us to find answer for this one
42. The ____ team is responsible for reestablishing connectivity between systems and to the internet.
Answer
Correct Answer:
Network recovery
Note: This Question is unanswered, help us to find answer for this one
43. The ____ team is responsible for recovering and reestablishing operating systems (oss).
Answer
Correct Answer:
Systems recovery
Note: This Question is unanswered, help us to find answer for this one
44. One way to identify a particular digital item (collection of bits) is by means of a(n) ____.
Answer
Correct Answer:
Cryptographic hash
Note: This Question is unanswered, help us to find answer for this one
45. Incident analysis resources include network diagrams and lists of ____, such as database servers.
Answer
Correct Answer:
Critical assets
Note: This Question is unanswered, help us to find answer for this one
46. If an intruder can ____ a device, then no electronic protection can deter the loss of information.
Answer
Correct Answer:
Physically access
Note: This Question is unanswered, help us to find answer for this one
47. An ____ may escalate into a disaster when it grows in scope and intensity.
Note: This Question is unanswered, help us to find answer for this one
48. A ____ is an agency that provides physical facilities in the event of a disaster for a fee.
Answer
Correct Answer:
Service bureau
Note: This Question is unanswered, help us to find answer for this one
49. ____ is the determination of the initial flaw or vulnerability that allowed an incident to occur.
Answer
Correct Answer:
Root cause Analysis
Note: This Question is unanswered, help us to find answer for this one
50. A recommended practice for the implementation of the physical ir plan is to select a ____ binder.
Note: This Question is unanswered, help us to find answer for this one
51. Objective measures of the user support or help desk operation are called ____.
Answer
Correct Answer:
Performance statistics
Note: This Question is unanswered, help us to find answer for this one
52. In a project schedule, the variable that has the least amount of flexibility is _____.
Note: This Question is unanswered, help us to find answer for this one
53. ____ tags are one type of real-time location system.
Note: This Question is unanswered, help us to find answer for this one
54. ____ is the last phase of the six-phase crisp-dm method.
Answer
Correct Answer:
Deployment.
Note: This Question is unanswered, help us to find answer for this one
55. A(n) ________ will stipulate what an employee should do when he notices something like a virus.
Answer
Correct Answer:
Incident-response plan
Note: This Question is unanswered, help us to find answer for this one
56. __________ sensors project and detect an infrared beam across an area.
Answer
Correct Answer:
Photoelectric
Note: This Question is unanswered, help us to find answer for this one
57. ____ attacks are responsible for half of all malware delivered by web advertising.
Answer
Correct Answer:
Fake antivirus
Note: This Question is unanswered, help us to find answer for this one
58. ______ refers to the deliberate falsification of information.
Answer
Correct Answer:
Disinformation
Note: This Question is unanswered, help us to find answer for this one
59. A centralized directory of digital certificates is called a(n) _____.
Answer
Correct Answer:
Certificate Repository (CR).
Note: This Question is unanswered, help us to find answer for this one
60. The ability to work on files at the same time as others is called ____.
Note: This Question is unanswered, help us to find answer for this one
61. _____ refers to a situation in which keys are managed by a third party, such as a trusted ca.
Answer
Correct Answer:
Key escrow
Note: This Question is unanswered, help us to find answer for this one
62. ____ apps can allow you to lock your mobile device and sim card remotely.
Answer
Correct Answer:
Mobile security
Note: This Question is unanswered, help us to find answer for this one
63. Most guards have clear __________ that help them to act decisively in unfamiliar situations.
Note: This Question is unanswered, help us to find answer for this one
64. The most sophisticated locks are __________ locks.
Answer
Correct Answer:
Biometric.
Note: This Question is unanswered, help us to find answer for this one
65. One of the leading causes of damage to sensitive circuitry is __________.
Note: This Question is unanswered, help us to find answer for this one
66. Class __________ fires are safely extinguished with non-conducting agents only.
Note: This Question is unanswered, help us to find answer for this one
Computer Engineering MCQs | Topic-wise