Home > MCQs > IT & Programming > Internet Security MCQs

Internet Security MCQ

Quizack is going to make you practice the latest Internet Security MCQs and Internet Security multiple choice questions and answers, via online interactive sessions. These MCQs have been chosen from the best reference books and online tests. Now you can instantly boost your knowledge via online simulations.

Internet Security Quick Quiz

Question 1 of 10
  • Modern secure password storage should implement:

    Answer & Explanation

    Correct Answer: Salted and hashed values of the password

    Note: This Question is unanswered, help us to find answer for this one

  • What are the two primary classifications of cross-site scripting?

    Answer & Explanation

    Correct Answer: non-persistent and persistent.

    Note: This Question is unanswered, help us to find answer for this one

  • Which of the following refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user's consent?

    Answer & Explanation

    Correct Answer: Spyware

    Note: This Question is unanswered, help us to find answer for this one

  • Which of the following keys are used to generate random numbers?

    Answer & Explanation

    Correct Answer: Symmetric and asymmetric random number generation keys

    Note: This Question is unanswered, help us to find answer for this one

  • How are port numbers categorized?

    Answer & Explanation

    Correct Answer: Well-known, registered, and static/dynamic.

    Note: This Question is unanswered, help us to find answer for this one

  • What is a computer worm?

    Answer & Explanation

    Correct Answer: It is malware designed to infect other computers.

    Note: This Question is unanswered, help us to find answer for this one

  • Which of the following is a VALID digital signature key?

    Answer & Explanation

    Correct Answer: Private signature key

    Note: This Question is unanswered, help us to find answer for this one

  • Why is a virtual machine considered a sandboxing method?

    Answer & Explanation

    Correct Answer: All host resources are channeled through the emulator.

    Note: This Question is unanswered, help us to find answer for this one

  • What is largely considered the most advanced computer virus?

    Answer & Explanation

    Correct Answer: Stuxnet.

    Note: This Question is unanswered, help us to find answer for this one

  • The ____ was established to secure and monitor security risks to u.s. networks and the internet.

    Answer & Explanation

    Correct Answer: US-CERT

    Note: This Question is unanswered, help us to find answer for this one

  • Internet Security Quick Quiz

    battery

    Poor Results!

    You need a lot of improvement.

    Just don't give up!

    Correct Answers: 0/10

    Start Practicing with our MCQs given below.