Correct Answer:
Checksum
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
23
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Voice over IP
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Reconfigure remote switches
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
US-CERT
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Voice/video
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Virtual Private Network (VPN)
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Packet sniffer
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
TPLs
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Master Boot Record
Note: This Question is unanswered, help us to find answer for this one
Select the drawbacks of Symmetric key cryptography.
Correct Answer:
It can't implement non-repudiation
It is less secure
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Which of the following are Transport Layer Security protocols?
Correct Answer:
SSL
SOCKS
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Which of the following authentication protocols are used to encrypt passwords?
Correct Answer:
CHAP
ARAP
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
What are the features of an IPS?
Correct Answer:
Fault Tolerance.
Minimal Overhead.
Timely Alerting Mechanism.
Anomaly based.
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Which of the following are the components of PKI?
Correct Answer:
Certificate Authority.
Organizational Registration Authorities
Certificate Holders
Clients that validate digital signatures.
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Which of the following technique is used to approach security in ActiveX?
Correct Answer:
Digital Sign
Note: This Question is unanswered, help us to find answer for this one
Which of the following are the components of a UTM appliance?
Correct Answer:
Firewall
Gateway Antispam
Gateway Antivirus
IDS/IPS
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Which of the following are the placement modes of an IDS/IPS?
Correct Answer:
Inline
Tap
SPAN
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Which of the following is Application-level security protocol are used for communications session security?
Correct Answer:
Both A and B
Note: This Question is unanswered, help us to find answer for this one
Which of the following statement shows the breach of Integrity:
Correct Answer:
Important data deleted from a document.
Note: This Question is unanswered, help us to find answer for this one
Which of the following Symmetric algorithms has variable key length?
Correct Answer:
Rivest Cipher 4
Note: This Question is unanswered, help us to find answer for this one
A positive detection of result that is false or untrue is called
Correct Answer:
False Positive
Note: This Question is unanswered, help us to find answer for this one
Which of the following can be classified as code and cryptographic attacks?
Correct Answer:
Viruses
Worms
Trojans
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Which protocol is used by RADIUS?
Correct Answer:
UDP
Note: This Question is unanswered, help us to find answer for this one
Which type of authentication is.”Something the user has ” ?
Correct Answer:
Dual Factor
Note: This Question is unanswered, help us to find answer for this one
Which port does IKE key negotiation protocol use?
Correct Answer:
UDP 500
Note: This Question is unanswered, help us to find answer for this one
In which of the following attacks, sending a large number of spoofed ICMP ECHO requests to broadcast address?
Correct Answer:
SMURF attack
Note: This Question is unanswered, help us to find answer for this one
In which of the following Buffer Overflow help us to find weaknesses?
Correct Answer:
Software
Note: This Question is unanswered, help us to find answer for this one
What is a UTM appliance?
Correct Answer:
Unified Threat Management.
Note: This Question is unanswered, help us to find answer for this one
Joe wants to secure his client’s Web Server. Which of the following measures will he take?
Correct Answer:
Managing Access Control
Eliminating Scripting Vulnerabilities
Maintaining Integrity.
Blocking Browser Exploits.
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Which of the following can be transmitted through an E-mail?
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
What is S/MIME?
Correct Answer:
Secure Multipurpose Internet Mail Extensions
Note: This Question is unanswered, help us to find answer for this one
Which of the following is created to serve as a snare for intruders?
Correct Answer:
Honey Pots.
Note: This Question is unanswered, help us to find answer for this one
Which of the following are the key principles of Internet Security?
Correct Answer:
Confidentiality, Integrity, Availability
Note: This Question is unanswered, help us to find answer for this one
What is RSA in cryptography?
Correct Answer:
Rivest, Shamir, Adleman
Note: This Question is unanswered, help us to find answer for this one
What does RBL contain?
Correct Answer:
IP addresses of open relay mail servers
Note: This Question is unanswered, help us to find answer for this one
Which of the following techniques is used to approach security in Java?
Correct Answer:
Sandboxing
Note: This Question is unanswered, help us to find answer for this one
What is RBL in E-mail Security?
Correct Answer:
Realtime Blackhole List
Note: This Question is unanswered, help us to find answer for this one
Which of the following keys helps us in the verification of the Digital Signature?
Correct Answer:
Public Key
Note: This Question is unanswered, help us to find answer for this one
How many keys are required if two parties communicate using Symmetric cryptography?
Correct Answer:
One
Note: This Question is unanswered, help us to find answer for this one
The concept of allowing access to resources only to those permitted is known as
Correct Answer:
Authorization
Note: This Question is unanswered, help us to find answer for this one
By which of the following methods can social engineering be curbed by?
Correct Answer:
User Education
Note: This Question is unanswered, help us to find answer for this one
Which of the following protocols does not help in securing the FTP?
Correct Answer:
SSFTP
Note: This Question is unanswered, help us to find answer for this one
The part of a company’s intranet which is extended to users outside the company is called:
Correct Answer:
Extranet
Note: This Question is unanswered, help us to find answer for this one
Which protocol is used to secure the WAP communication?
Correct Answer:
Wireless Transport Layer Security
Note: This Question is unanswered, help us to find answer for this one
Mike wants to secure the data on his personal computer. Which of the following options will he choose to secure the data?
Correct Answer:
Encryption
Note: This Question is unanswered, help us to find answer for this one
By which of the following can the injection of bogus routes into the core network be prevented ?
Correct Answer:
Route Authentication
Note: This Question is unanswered, help us to find answer for this one
Which of the following detect/s security weaknesses in a remote or local host?
Correct Answer:
Scanner
Note: This Question is unanswered, help us to find answer for this one
Which of the following statements is true of Tunneling?
Correct Answer:
Contents of the protocol are encapsulated.
Note: This Question is unanswered, help us to find answer for this one
A Brute Force attack
Correct Answer:
discovers the passwords.
Note: This Question is unanswered, help us to find answer for this one
The process of switching protocols between routing devices is called
Correct Answer:
Protocol Switching
Note: This Question is unanswered, help us to find answer for this one
What is function of IPS?
Correct Answer:
A device to block intrusion attacks
Note: This Question is unanswered, help us to find answer for this one
A criminal who breaks into computers maliciously is known as
Correct Answer:
Black Hat Hacker.
Note: This Question is unanswered, help us to find answer for this one
Below are the given statements, which statement shows the breach of Availability:
Correct Answer:
SYN attack on a server.
Note: This Question is unanswered, help us to find answer for this one
Which port is used by PPTP?
Correct Answer:
1723
Note: This Question is unanswered, help us to find answer for this one
Which of the following statements resembles Trojan horses?
Correct Answer:
Installation of Backdoor Programs.
Note: This Question is unanswered, help us to find answer for this one
Which key is used to decrypt the message in PKI?
Correct Answer:
Private Key
Note: This Question is unanswered, help us to find answer for this one
Which protocol is used by TACACS+?
Correct Answer:
TCP
Note: This Question is unanswered, help us to find answer for this one
What is the key length of Triple DES?
Correct Answer:
168
Note: This Question is unanswered, help us to find answer for this one
Which of the following helps us to block attacks on a single machine?
Correct Answer:
Host Based IPS
Note: This Question is unanswered, help us to find answer for this one
Which of the following is an Asymmetric algorithm?
Correct Answer:
El Gamal
Note: This Question is unanswered, help us to find answer for this one
In which of the following protocols does an SYN attack help to find a weakness?
Correct Answer:
TCP/IP
Note: This Question is unanswered, help us to find answer for this one
In how many phases is a IPSec VPN connection completed while making a VPN connection with a Security product?
Correct Answer:
2
Note: This Question is unanswered, help us to find answer for this one
Which of the following is an application attack?
Correct Answer:
Buffer Overflow
Note: This Question is unanswered, help us to find answer for this one
Which of the following is the standard certificate?
Correct Answer:
X.509
Note: This Question is unanswered, help us to find answer for this one
Which of the following Asymmetric encryption algorithms is supported by S/MIME?
Correct Answer:
RSA
Note: This Question is unanswered, help us to find answer for this one
By which of the following third parties are Digital Certificates signed?
Correct Answer:
Certificate Authority
Note: This Question is unanswered, help us to find answer for this one
Which protocol helps in securing LDAP?
Correct Answer:
SSL/TLS
Note: This Question is unanswered, help us to find answer for this one
Allen wants to sign a message which he is sending to Mark. Which key will Allen use to sign the message?
Correct Answer:
Allen’s Private key.
Note: This Question is unanswered, help us to find answer for this one
The ability to exploit a vulnerability is called:
Correct Answer:
Threat
Note: This Question is unanswered, help us to find answer for this one
Which of the following goals cannot be achieved with Symmetric cryptography?
Correct Answer:
Non-repudiation
Note: This Question is unanswered, help us to find answer for this one
Which of the following protocols uses UDP:
Correct Answer:
DNS
TFTP
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Select the objectives of E-mail security.
Correct Answer:
Verifying the source of a message.
Classifying attachments.
Message integrity.
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Which of the following appliances help/s in filtering virus packets?
Correct Answer:
Antivirus Engines
UTM
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Which of the following are the components of IPSec?
Correct Answer:
Authentication Header.
Encapsulating Security Payload.
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Which of the following methods can be used for Network hardening?
Correct Answer:
Evaluating IDS
Refining ACLs on routers and switches.
Up-to-date OS and patches of Network devices.
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Which of the following measures are taken to enhance the security of the system? (Select all that apply)
Correct Answer:
Operating System based hardening
Network Based hardening
Application Based hardening
Timely Refining of Security Policies
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Which of the following are Vulnerability assessment tools?
Correct Answer:
Nmap
Nessus
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Select the common VPN protocols.
Correct Answer:
L2TP
PPTP
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Which of the following can be classified as passive attacks?
Correct Answer:
Vulnerability scans.
Sniffing.
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Which of the following are Email Security protocols?
Correct Answer:
S/MIME
PEM
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Which of the following Symmetric encryption algorithms is/are supported by S/MIME?
Correct Answer:
DES
3DES
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Which of the following things should be kept in mind while managing passwords?
Correct Answer:
Easily guessed passwords should not be used.
Passwords should not be stored on a plain view.
Passwords should be changed once a month.
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Which of the following are the advantages of Honeypots?
Correct Answer:
Intelligent IDS
Distracts Hackers
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Which of the following are signs of Security breach?
Correct Answer:
Data modification and deletion.
System performance issues.
Different traffic patterns.
Large number of failed log in attempts.
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Which of the below listed are included in Application hardening?
Correct Answer:
DNS server
Mail Server
Web Server
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Fraudtool
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
RC4
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
application layer
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Private key transport key
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Proxy Server Gateways
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
TRACE
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
seccomp, or Secure Computing Mode
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Public key transport key
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Symmetric key wrapping key
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Public ephemeral key agreement key
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
CBC
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Private static key agreement key
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Private ephemeral key agreement key
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Private ephemeral key agreement key
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Private signature key
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
White-listing access to TCP services on critical systems.
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
It specifies how transferred information is converted into cyphertext.
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
non-persistent and persistent.
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Public authorization key
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Cookies allow for cookie-based user authentication.
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
TLS 1.0
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Spear phishing
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Transport Layer Security
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
When it is at rest.
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Well-known, registered, and static/dynamic.
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
All host resources are channeled through the emulator.
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
All of the given options are correct
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
It is linked with a single cable which can be a major vulnerability.
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
X.509
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Large-scale SQL databases such as those containing credit card information.
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Trojan Horse
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Anyone can encrypt with the public key, only one person can decrypt with the private key
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Browser Exploit Against SSL/TLS
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
IP layer
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Internet Engineering Task Force
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Botnet
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Injection of client-side scripts into web pages.
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
It is the framework of the components of a computer network.
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Yes, however the majority are coded to attack Windows-based systems.
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Session hijacking
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Both Integrated Key Management System and Third-Party Key Management System
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Hardware and software.
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Physical and logical.
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
SSL 3.0 improved upon SSL 2.0 by adding SHA-1 based ciphers and support for certificate authentication
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
All of the given options are correct
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Yes. A proxy acts as a network intermediary for the user that serves to control the flow of incomming and outgoing traffic.
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
All of the given options are correct
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
To prevent unauthorized access to private networks and sensitive information during its most vulnerable state.
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Total disk encryption coupled with strong network security protocols.
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
All of the given options are correct
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
All of the given options are correct
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Information is repeatedly sent to the victim to consume their system resources, causing them to shut down.
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Use HTTPS connections and verify the SSL certificate
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Transmission Control Protocol
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
All of the given options are correct
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
All of the given options are correct
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Attackers emulate users by stealing their cookies.
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Internet Protocol
Note: This Question is unanswered, help us to find answer for this one
Internet Security MCQs | Topic-wise