Information Security MCQs and Notes

R

Ranjeet • 34.60K Points
Instructor I

Q 1. What "layer" of an e-mail message should you consider when evaluating e-mail security?

(A) TCP/IP
(B) SMTP
(C) Body
(D) All of the above

G

Gopal Sharma • 38.32K Points
Coach

Q 2. This electronic "credit card" establishes a user's credentials when doing business or other transactions on the Web and is issued by a certification authority.

(A) Private key
(B) Digital certificate
(C) Smart card
(D) Ownership tag

P

Praveen Singh • 36.71K Points
Coach

Q 3. This is a compromised Web site that is being used as an attack launch point in a denialof-service attack.

(A) Bastion host
(B) Packet monkey
(C) Dongle
(D) Zombie

R

Ranjeet • 34.60K Points
Instructor I

Q 4. This is a type of network security attack in which the intruder takes control of a communication between two entities and masquerades as one of them.

(A) Hijacking
(B) Identity theft
(C) Smurf attack
(D) Tunneling

P

Priyanka Tomar • 35.28K Points
Coach

Q 5. This is the forging of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source.

(A) Foot printing
(B) Non repudiation
(C) E-mail spoofing
(D) Finger

A

Admin • 36.93K Points
Coach

Q 6. This type of attack may cause additional damage by sending data containing codes designed to trigger specific actions - for example, changing data or disclosing confidential information.

(A) Buffer overflow
(B) Block cipher
(C) War dialing
(D) Distributed denial-of-service attack

G

Gopal Sharma • 38.32K Points
Coach

Q 7. This is the modification of personal information on a Web user's computer to gain unauthorized information with which to obtain access to the user's existing accounts.

(A) Identity theft
(B) Cookie poisoning
(C) Shoulder surfing
(D) Relative identifier

R

Ranjeet • 34.60K Points
Instructor I

Q 8. This is a program in which harmful code is contained inside apparently harmless programming or data.

(A) Snort
(B) Honeypot
(C) Blue bomb
(D) Trojan horse

R

Rakesh Kumar • 28.44K Points
Instructor II

Q 9. This is an attack on a computer system that takes advantage of a particular vulnerability that the system offers to intruders.

(A) Port scan
(B) Denial of service
(C) Exploit
(D) Logic bomb

S

Shiva Ram • 30.44K Points
Instructor I

Q 10. The developers of an operating system or vendor application might issue this to prevent intruders from taking advantage of a weakness in their programming.

(A) Cookie
(B) Key fob
(C) Watermark
(D) Patch

Download our easy to use, user friendly Android App from Play Store. And learn MCQs with one click.

Image