Information Security MCQs and Notes

V

Vijay Sangwan • 28.62K Points
Instructor II

Q 41. At which two traffic layers do most commercial IDSes generate signatures?

  • (A) Application layer
  • (B) Network layer
  • (C) Session layer
  • (D) Transport layer

P

Praveen Singh • 36.81K Points
Coach

Q 42. This is a mechanism for ensuring that only authorized users can copy or use specific software applications.

  • (A) Authorized program analysis report
  • (B) Private key
  • (C) Service level agreement
  • (D) Dongle

P

Praveen Singh • 36.81K Points
Coach

Q 43. This is the name for a group of programmers who are hired to expose errors or security holes in new software or to find out why a computer network's security is being broken.

  • (A) ERM group
  • (B) Computer emergency response tea
  • (C) Tiger team
  • (D) Silicone cockroach

R

Ranjeet • 34.60K Points
Instructor I

Q 44. This is a series of messages sent by someone attempting to break into a computer to learn which computer network services the computer provides.

  • (A) Bit robbing
  • (B) Web services description language (WSDL)
  • (C) Jabber
  • (D) Port scan

P

Priyanka Tomar • 35.28K Points
Coach

Q 45. __________ is an electronic or paper log used to track computer activity.

  • (A) Traceroute
  • (B) Cookie
  • (C) Weblog
  • (D) Audit trail

S

Shiva Ram • 30.44K Points
Instructor I

Q 46. This technology is used to measure and analyze human body characteristics for authentication purposes.

  • (A) Footprinting
  • (B) Biometrics
  • (C) JBOD
  • (D) Anthropomorphism

Download our easy to use, user friendly Android App from Play Store. And learn MCQs with one click.

Image