Information Security MCQs and Notes
R
Q 31. An IDS follows a two-step process consisting of a passive component and an active component. Which of the following is part of the active component?
A
Q 32. This is is the hiding of a secret message within an ordinary message and the extraction of it at its destination.
V
Q 33. What is the purpose of a shadow honeypot?
V
Q 34. This is an encryption/decryption key known only to the party or parties that exchange secret messages.
P
Q 35. A false positive can be defined as…
P
Q 36. Which of the following is an advantage of anomaly detection?
P
Q 37. This is an assault on the integrity of a security system in which the attacker substitutes a section of cipher text (encrypted text) with a different section that looks like (but is not the same as) the one removed.
A
Q 38. This enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority.
A
Q 39. ___________is a form of eavesdropping used to pick up telecommunication signals by monitoring the electromagnetic fields produced by the signals.
V