Home / Engineering / Information Cyber Security (ICS) MCQs / Page 2

Information Cyber Security (ICS) MCQs | Page - 2

Dear candidates you will find MCQ questions of Information Cyber Security (ICS) here. Learn these questions and prepare yourself for coming examinations and interviews. You can check the right answer of any question by clicking on any option or by clicking view answer button.

M

Mr. Dubey • 51.43K Points
Coach

Q. 11) For each _______ the Kerberos Key Distribution Center (KDC) maintains a database of the realm’s principal and the principal’s associated “secret keys”.

(A) key
(B) realm
(C) document
(D) none of the mentioned
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 12) The basic Web Services platform is combination of _____ and _______

(A) css + http
(B) xml + html
(C) xml + http
(D) css + java
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 13) For a client-server authentication, the client requests from the KDC a ________ for access to a specific asset.

(A) ticket
(B) local
(C) token
(D) user
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 14) What is one advantage of setting up a DMZ with two firewalls?

(A) you can control where traffic goes in three networks
(B) you can do stateful packet filtering
(C) you can do load balancing
(D) ??improved network performance
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 15) What are the two primary classifications of cross-site scripting?

(A) dom based and persistent
(B) traditional and dom based
(C) traditional and non-persistent
(D) non-persistent and persistent
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 16) Imagine a social networking web app (like Twitter) that allows users to post short blurbs of text.

(A) cross-site scripting
(B) sql injection
(C) packet sniffing
(D) a and b
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 17) Why would a hacker use a proxy server?

(A) to create a stronger connection with the target.
(B) to create a ghost server on the network.
(C) to obtain a remote access connection
(D) to hide malicious activity on the network.
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 18) IPSec is designed to provide security at the _________

(A) transport layer
(B) network layer
(C) application layer
(D) session layer
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 19) Which component is included in IP security?

(A) authentication header (ah)
(B) encapsulating security payload (esp)
(C) internet key exchange (ike)
(D) all of the mentioned
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 20) What is Firewall?

(A) firewalls are network based security measures that control the flow of incoming and outgoing traffic
(B) firewall is a program that encrypts all programs that access the internet
(C) a firewall is a program that keeps other programs from using the internet
(D) firewall are the interrupts that automatically disconnect from the internet when a threat appears.
View Answer Discuss Share