MCQOPTIONS
Saved Bookmarks
This section includes 1690 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
| 1151. |
MD5 produces __ bits hash data. |
| A. | 128 |
| B. | 150 |
| C. | 160 |
| D. | 112 |
| Answer» B. 150 | |
| 1152. |
What is a Hash Function ? |
| A. | It creates a small flexible block of data |
| B. | It creates a small,fixed block of data |
| C. | It creates a encrypted block of data |
| D. | none of the mentioned |
| Answer» C. It creates a encrypted block of data | |
| 1153. |
Which of following is not a stream cipher? |
| A. | Two fish |
| B. | RC5 |
| C. | RC4 |
| D. | TBONE |
| Answer» E. | |
| 1154. |
What is not an encryption standard ? |
| A. | AES |
| B. | TES |
| C. | Triple DES |
| D. | DES |
| Answer» C. Triple DES | |
| 1155. |
What is cipher-block chaining ? |
| A. | Data is logically ‘ANDed’ with previous block |
| B. | Data is logically ‘ORed’ with previous block |
| C. | Data is logically ‘XORed’ with previous block |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 1156. |
What is not a role of encryption ? |
| A. | It is used to protect data from unauthorized access during transmission |
| B. | It is used to ensure user authentication |
| C. | It is used to ensure data integrity |
| D. | It is used to ensure data corruption doesn’t happens |
| Answer» E. | |
| 1157. |
What is preferred way of encryption ? |
| A. | pre shared secret key |
| B. | using key distribution center (KDC) |
| C. | public key-encryption |
| D. | symmetric key |
| Answer» D. symmetric key | |
| 1158. |
What are strengths of Network based IDS ? |
| A. | Cost of ownership reduced |
| B. | Malicious intent detection |
| C. | Real time detection and response |
| D. | All of the mentioned |
| Answer» E. | |
| 1159. |
What are characteristics of Network based IDS ? |
| A. | They look for attack signatures in network traffic |
| B. | Filter decides which traffic will not be discarded or passed |
| C. | It is programmed to interpret a certain series of packet |
| D. | It models the normal usage of network as a noise characterization |
| Answer» B. Filter decides which traffic will not be discarded or passed | |
| 1160. |
What are characteristics of stack based IDS ? |
| A. | They are integrated closely with the TCP/IP stack and watch packets |
| B. | The host operating system logs in the audit information |
| C. | It is programmed to interpret a certain series of packets |
| D. | It models the normal usage of network as a noise characterization |
| Answer» B. The host operating system logs in the audit information | |
| 1161. |
What are strengths of the host based IDS ? |
| A. | Attack verification |
| B. | System specific activity |
| C. | No additional hardware required |
| D. | All of the mentioned |
| Answer» E. | |
| 1162. |
What are drawbacks of the host based IDS ? |
| A. | Unselective logging of messages may increase the audit burdens |
| B. | Selective logging runs the risk of missed attacks |
| C. | They are very fast to detect |
| D. | They have to be programmed for new patterns |
| Answer» B. Selective logging runs the risk of missed attacks | |
| 1163. |
What are characteristics of Host based IDS ? |
| A. | The host operating system logs in the audit information |
| B. | Logs includes logins,file opens and program executions |
| C. | Logs are analysed to detect tails of intrusion |
| D. | All of the mentioned |
| Answer» E. | |
| 1164. |
What are drawbacks of signature based IDS ? |
| A. | They are unable to detect novel attacks |
| B. | They suffer from false alarms |
| C. | They have to be programmed again for every new pattern to be detected |
| D. | All of the mentioned |
| Answer» E. | |
| 1165. |
What are characteristics of signature based IDS ? |
| A. | Most are based on simple pattern matching algorithms |
| B. | It is programmed to interpret a certain series of packets |
| C. | It models the normal usage of network as a noise characterization |
| D. | Anything distinct from the noise is assumed to be intrusion activity |
| Answer» B. It is programmed to interpret a certain series of packets | |
| 1166. |
What is major drawback of anomaly detection IDS ? |
| A. | These are very slow at detection |
| B. | It generates many false alarms |
| C. | It doesn’t detect novel attacks |
| D. | None of the mentioned |
| Answer» C. It doesn’t detect novel attacks | |
| 1167. |
What are characteristics of anomaly based IDS ? |
| A. | It models the normal usage of network as a noise characterization |
| B. | It doesn’t detect novel attacks |
| C. | Anything distinct from the noise is not assumed to be intrusion activity |
| D. | It detects based on signature |
| Answer» B. It doesn’t detect novel attacks | |
| 1168. |
What are the different ways to classify an IDS ? |
| A. | anomaly detection |
| B. | signature based misuse |
| C. | stack based |
| D. | all of the mentioned |
| Answer» E. | |
| 1169. |
What are major components of intrusion detection system ? |
| A. | Analysis Engine |
| B. | Event provider |
| C. | Alert Database |
| D. | All of the mentioned |
| Answer» E. | |
| 1170. |
What are the different ways to intrude ? |
| A. | Buffer overflows |
| B. | Unexpected combinations and unhandled input |
| C. | Race conditions |
| D. | All of the mentioned |
| Answer» E. | |
| 1171. |
What is are two safe computing practices ? |
| A. | Not to open software from unknown vendors |
| B. | Open and execute programs in admin level/root |
| C. | Open and execute programs in presence of antivirus |
| D. | None of the mentioned |
| Answer» B. Open and execute programs in admin level/root | |
| 1172. |
What is known as sandbox ? |
| A. | It is a program which can be molded to do desired task |
| B. | It is program that is controlled or emulated section of OS |
| C. | It is a special mode of antivirus |
| D. | None of the mentioned |
| Answer» C. It is a special mode of antivirus | |
| 1173. |
How does an antivirus of today identify viruses ? |
| A. | Previously known patterns |
| B. | It can detect unknown patterns |
| C. | It can take high priority to increase scanning speed |
| D. | None of the mentioned |
| Answer» B. It can detect unknown patterns | |
| 1174. |
How do viruses avoid basic pattern match of antivirus ? |
| A. | They are encrypted |
| B. | They act with special permissions |
| C. | They modify themselves |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 1175. |
What are two features of a tripwire file system ? |
| A. | It is a tool to monitor file systems |
| B. | It is used to automatically take corrective action |
| C. | It is used to secure UNIX system |
| D. | None of the mentioned |
| Answer» B. It is used to automatically take corrective action | |
| 1176. |
Which direction access cannot happen using DMZ zone by default ? |
| A. | Company computer to DMZ |
| B. | Internet to DMZ |
| C. | Internet to company computer |
| D. | Company computer to internet |
| Answer» D. Company computer to internet | |
| 1177. |
What is best practice in firewall domain environment ? |
| A. | Create two domain trusted and untrusted domain |
| B. | Create strong policy in firewall to support different types of users |
| C. | Create a Demilitarized zone |
| D. | Create two DMZ zones with one untrusted domain |
| Answer» D. Create two DMZ zones with one untrusted domain | |
| 1178. |
What is used to protect network from outside internet access ? |
| A. | A trusted antivirus |
| B. | 24 hours scanning for virus |
| C. | Firewall to separate trusted and untrusted network |
| D. | Deny users access to websites which can potentially cause security leak |
| Answer» D. Deny users access to websites which can potentially cause security leak | |
| 1179. |
What is not a important part of security protection ? |
| A. | Large amount of RAM to support antivirus |
| B. | Strong passwords |
| C. | Audit log periodically |
| D. | Scan for unauthorized programs in system directories |
| Answer» B. Strong passwords | |
| 1180. |
With regard to DOS attack what is not true from below options ? |
| A. | We can stop DOS attack completely |
| B. | By upgrading OS vulnerability we can stop DOS attack to some extent |
| C. | DOS attack has to be stopped at network level |
| D. | Such attack can last for hours |
| Answer» B. By upgrading OS vulnerability we can stop DOS attack to some extent | |
| 1181. |
What is known as DOS attack ? |
| A. | It is attack to block traffic of network |
| B. | It is attack to harm contents stored in HDD by worm spawn processes |
| C. | It is an attempt to make a machine or network resource unavailable |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 1182. |
What are zombie systems ? |
| A. | Are specific system which are designed to attack by manufacturer |
| B. | They are network of known hacking group |
| C. | These systems are previously compromised, independent systems |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 1183. |
Which is not a valid port scan type ? |
| A. | ACK scanning |
| B. | Window scanning |
| C. | IGMP scan |
| D. | FIN scanning |
| Answer» D. FIN scanning | |
| 1184. |
Which is not a port scan type ? |
| A. | TCP scanning |
| B. | SYN scanning |
| C. | UDP scanning |
| D. | SYSTEM Scanning |
| Answer» E. | |
| 1185. |
What is port scanning ? |
| A. | It is a software used to scan system for attack |
| B. | It is a software application designed to probe a server or host for open ports |
| C. | It is software used to scan system for introducing attacks by brute force |
| D. | None of the mentioned |
| Answer» C. It is software used to scan system for introducing attacks by brute force | |
| 1186. |
Who unleashed famous worm attack in 1988 which effected UNIX systems and caused losses in millions ? |
| A. | Robert Morris |
| B. | Bob Milano |
| C. | Mark zuckerberg |
| D. | Bill Gates |
| Answer» B. Bob Milano | |
| 1187. |
What is known as masquerading ? |
| A. | When one participant in communication pretends to be someone else |
| B. | When attacker modifies data in communication |
| C. | When attack is of fraudulent repeat of a valid data |
| D. | When attack gains access to remote systems |
| Answer» B. When attacker modifies data in communication | |
| 1188. |
Which of the following is not a characteristic of virus ? |
| A. | Virus destroy and modify user data |
| B. | Virus is a standalone program |
| C. | Virus is a code embedded in a legitimate program |
| D. | Virus cannot be detected |
| Answer» E. | |
| 1189. |
Which mechanism is used by worm process ? |
| A. | Trap door |
| B. | Fake process |
| C. | Spawn Process |
| D. | VAX process |
| Answer» D. VAX process | |
| 1190. |
What is trap door ? |
| A. | IT is trap door in WarGames |
| B. | It is a hole in software left by designer |
| C. | It is a Trojan horse |
| D. | It is a virus which traps and locks user terminal |
| Answer» C. It is a Trojan horse | |
| 1191. |
What is Trojan horse ? |
| A. | It is a useful way to encrypt password |
| B. | It is a user which steals valuable information |
| C. | It is a rogue program which tricks users |
| D. | It’s a brute force attack algorithm |
| Answer» D. It’s a brute force attack algorithm | |
| 1192. |
What is breach of availability ? |
| A. | This type of violation involves unauthorized reading of data |
| B. | This violation involves unauthorized modification of data |
| C. | This violation involves unauthorized destruction of data |
| D. | This violation involves unauthorized use of resources |
| Answer» D. This violation involves unauthorized use of resources | |
| 1193. |
What is theft of service ? |
| A. | This type of violation involves unauthorized reading of data |
| B. | This violation involves unauthorized modification of data |
| C. | This violation involves unauthorized destruction of data |
| D. | This violation involves unauthorized use of resources |
| Answer» E. | |
| 1194. |
What is breach of confidentiality ? |
| A. | This type of violation involves unauthorized reading of data |
| B. | This violation involves unauthorized modification of data |
| C. | This violation involves unauthorized destruction of data |
| D. | This violation involves unauthorized use of resources |
| Answer» B. This violation involves unauthorized modification of data | |
| 1195. |
What is breach of integrity ? |
| A. | This type of violation involves unauthorized reading of data |
| B. | This violation involves unauthorized modification of data |
| C. | This violation involves unauthorized destruction of data |
| D. | This violation involves unauthorized use of resources |
| Answer» C. This violation involves unauthorized destruction of data | |
| 1196. |
What is not a best practice for password policy ? |
| A. | Deciding maximum age of password |
| B. | Restriction on password reuse and history |
| C. | Password encryption |
| D. | Having change password every 2 years |
| Answer» E. | |
| 1197. |
What forces the user to change password at first logon ? |
| A. | Default behavior of OS |
| B. | Part of AES encryption practice |
| C. | Devices being accessed forces the user |
| D. | Account administrator |
| Answer» E. | |
| 1198. |
What is characteristics of Authorization ? |
| A. | RADIUS and RSA |
| B. | 3 way handshaking with syn and fin |
| C. | Multilayered protection for securing resources |
| D. | Deals with privileges and rights |
| Answer» E. | |
| 1199. |
Which happens first authorization or authentication ? |
| A. | Authorization |
| B. | Authentication |
| C. | Authorization & Authentication are same |
| D. | None of the mentioned |
| Answer» B. Authentication | |
| 1200. |
What is characteristic of RADIUS system ? |
| A. | It is essential for centralized encryption and authentication |
| B. | It works on Network layer to deny access to unauthorized people |
| C. | It provides centralized authentication mechanism via network devices |
| D. | It’s a strong File access system |
| Answer» D. It’s a strong File access system | |