Information Security MCQs and Notes

R

Ranjeet • 34.60K Points
Instructor I

Q 1. What "layer" of an e-mail message should you consider when evaluating e-mail security?

  • (A) TCP/IP
  • (B) SMTP
  • (C) Body
  • (D) All of the above

G

Gopal Sharma • 38.32K Points
Coach

Q 2. This electronic "credit card" establishes a user's credentials when doing business or other transactions on the Web and is issued by a certification authority.

  • (A) Private key
  • (B) Digital certificate
  • (C) Smart card
  • (D) Ownership tag

P

Praveen Singh • 36.81K Points
Coach

Q 3. This is a compromised Web site that is being used as an attack launch point in a denialof-service attack.

  • (A) Bastion host
  • (B) Packet monkey
  • (C) Dongle
  • (D) Zombie

R

Ranjeet • 34.60K Points
Instructor I

Q 4. This is a type of network security attack in which the intruder takes control of a communication between two entities and masquerades as one of them.

  • (A) Hijacking
  • (B) Identity theft
  • (C) Smurf attack
  • (D) Tunneling

P

Priyanka Tomar • 35.28K Points
Coach

Q 5. This is the forging of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source.

  • (A) Foot printing
  • (B) Non repudiation
  • (C) E-mail spoofing
  • (D) Finger

A

Admin • 37.26K Points
Coach

Q 6. This type of attack may cause additional damage by sending data containing codes designed to trigger specific actions - for example, changing data or disclosing confidential information.

  • (A) Buffer overflow
  • (B) Block cipher
  • (C) War dialing
  • (D) Distributed denial-of-service attack

G

Gopal Sharma • 38.32K Points
Coach

Q 7. This is the modification of personal information on a Web user's computer to gain unauthorized information with which to obtain access to the user's existing accounts.

  • (A) Identity theft
  • (B) Cookie poisoning
  • (C) Shoulder surfing
  • (D) Relative identifier

R

Ranjeet • 34.60K Points
Instructor I

Q 8. This is a program in which harmful code is contained inside apparently harmless programming or data.

  • (A) Snort
  • (B) Honeypot
  • (C) Blue bomb
  • (D) Trojan horse

R

Rakesh Kumar • 28.44K Points
Instructor II

Q 9. This is an attack on a computer system that takes advantage of a particular vulnerability that the system offers to intruders.

  • (A) Port scan
  • (B) Denial of service
  • (C) Exploit
  • (D) Logic bomb

S

Shiva Ram • 30.44K Points
Instructor I

Q 10. The developers of an operating system or vendor application might issue this to prevent intruders from taking advantage of a weakness in their programming.

  • (A) Cookie
  • (B) Key fob
  • (C) Watermark
  • (D) Patch

Download our easy to use, user friendly Android App from Play Store. And learn MCQs with one click.

Image