Information Security MCQs and Notes

P

Praveen Singh • 36.71K Points
Coach

Q 11. This type of intrusion relies on the intruder's ability to trick people into breaking normal security procedures.

(A) Shoulder surfing
(B) Hijacking
(C) Brain fingerprinting
(D) Social engineering

R

Ram Sharma • 193.84K Points
Coach

Q 12. An intruder might install this on a networked computer to collect user ids and passwords from other machines on the network.

(A) Passphrase
(B) Root kit
(C) Ownership tag
(D) Token

R

Ranjeet • 34.60K Points
Instructor I

Q 13. This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies.

(A) Chaffing and winnowing
(B) Cryptanalysis
(C) Serendipity
(D) Brute force cracking

S

Shiva Ram • 30.44K Points
Instructor I

Q 14. This is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding cipher text value and vice versa.

(A) Foot printing
(B) Hash function
(C) Watermark
(D) Electronic Code Book

V

Vikash Gupta • 33.56K Points
Instructor I

Q 15. In password protection, this is a random string of data used to modify a password hash.

(A) Sheepdip
(B) Salt
(C) Bypass
(D) Dongle

A

Admin • 36.93K Points
Coach

Q 16. This is the inclusion of a secret message in otherwise unencrypted text or images.

(A) Masquerade
(B) Steganography
(C) Spoof
(D) Eye-in-hand system

P

Priyanka Tomar • 35.28K Points
Coach

Q 17. This is the encryption algorithm that will begin to supplant the Data Encryption Standard (DES) - and later Triple DES - over the next few years as the new standard encryption algorithm.

(A) Rijndael
(B) Kerberos
(C) Blowfish
(D) IPsec

P

Praveen Singh • 36.71K Points
Coach

Q 18. Developed by Philip R. Zimmermann, this is the most widely used privacy-ensuring program by individuals and is also used by many corporations.

(A) DS
(B) OCSP
(C) Secure HTTP
(D) Pretty Good Privacy

A

Admin • 36.93K Points
Coach

Q 19. This is the name for the issuer of a PKI certificate.

(A) Man in the middle
(B) Certificate authority
(C) Resource Access Control Facility
(D) Script kiddy

R

Rakesh Kumar • 28.44K Points
Instructor II

Q 20. Today, many Internet businesses and users take advantage of cryptography based on this approach.

(A) Public key infrastructure
(B) Output feedback
(C) Encrypting File System
(D) Single sign on

Download our easy to use, user friendly Android App from Play Store. And learn MCQs with one click.

Image