Information Security MCQs and Notes

V

Vijay Sangwan • 28.62K Points
Instructor II

Q 41. At which two traffic layers do most commercial IDSes generate signatures?

(A) Application layer
(B) Network layer
(C) Session layer
(D) Transport layer

P

Praveen Singh • 36.71K Points
Coach

Q 42. This is a mechanism for ensuring that only authorized users can copy or use specific software applications.

(A) Authorized program analysis report
(B) Private key
(C) Service level agreement
(D) Dongle

P

Praveen Singh • 36.71K Points
Coach

Q 43. This is the name for a group of programmers who are hired to expose errors or security holes in new software or to find out why a computer network's security is being broken.

(A) ERM group
(B) Computer emergency response tea
(C) Tiger team
(D) Silicone cockroach

R

Ranjeet • 34.60K Points
Instructor I

Q 44. This is a series of messages sent by someone attempting to break into a computer to learn which computer network services the computer provides.

(A) Bit robbing
(B) Web services description language (WSDL)
(C) Jabber
(D) Port scan

P

Priyanka Tomar • 35.28K Points
Coach

Q 45. __________ is an electronic or paper log used to track computer activity.

(A) Traceroute
(B) Cookie
(C) Weblog
(D) Audit trail

S

Shiva Ram • 30.44K Points
Instructor I

Q 46. This technology is used to measure and analyze human body characteristics for authentication purposes.

(A) Footprinting
(B) Biometrics
(C) JBOD
(D) Anthropomorphism

Download our easy to use, user friendly Android App from Play Store. And learn MCQs with one click.

Image