Explore topic-wise MCQs in Technical Programming.

This section includes 1690 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.

1151.

MD5 produces __ bits hash data.

A. 128
B. 150
C. 160
D. 112
Answer» B. 150
1152.

What is a Hash Function ?

A. It creates a small flexible block of data
B. It creates a small,fixed block of data
C. It creates a encrypted block of data
D. none of the mentioned
Answer» C. It creates a encrypted block of data
1153.

Which of following is not a stream cipher?

A. Two fish
B. RC5
C. RC4
D. TBONE
Answer» E.
1154.

What is not an encryption standard ?

A. AES
B. TES
C. Triple DES
D. DES
Answer» C. Triple DES
1155.

What is cipher-block chaining ?

A. Data is logically ‘ANDed’ with previous block
B. Data is logically ‘ORed’ with previous block
C. Data is logically ‘XORed’ with previous block
D. None of the mentioned
Answer» D. None of the mentioned
1156.

What is not a role of encryption ?

A. It is used to protect data from unauthorized access during transmission
B. It is used to ensure user authentication
C. It is used to ensure data integrity
D. It is used to ensure data corruption doesn’t happens
Answer» E.
1157.

What is preferred way of encryption ?

A. pre shared secret key
B. using key distribution center (KDC)
C. public key-encryption
D. symmetric key
Answer» D. symmetric key
1158.

What are strengths of Network based IDS ?

A. Cost of ownership reduced
B. Malicious intent detection
C. Real time detection and response
D. All of the mentioned
Answer» E.
1159.

What are characteristics of Network based IDS ?

A. They look for attack signatures in network traffic
B. Filter decides which traffic will not be discarded or passed
C. It is programmed to interpret a certain series of packet
D. It models the normal usage of network as a noise characterization
Answer» B. Filter decides which traffic will not be discarded or passed
1160.

What are characteristics of stack based IDS ?

A. They are integrated closely with the TCP/IP stack and watch packets
B. The host operating system logs in the audit information
C. It is programmed to interpret a certain series of packets
D. It models the normal usage of network as a noise characterization
Answer» B. The host operating system logs in the audit information
1161.

What are strengths of the host based IDS ?

A. Attack verification
B. System specific activity
C. No additional hardware required
D. All of the mentioned
Answer» E.
1162.

What are drawbacks of the host based IDS ?

A. Unselective logging of messages may increase the audit burdens
B. Selective logging runs the risk of missed attacks
C. They are very fast to detect
D. They have to be programmed for new patterns
Answer» B. Selective logging runs the risk of missed attacks
1163.

What are characteristics of Host based IDS ?

A. The host operating system logs in the audit information
B. Logs includes logins,file opens and program executions
C. Logs are analysed to detect tails of intrusion
D. All of the mentioned
Answer» E.
1164.

What are drawbacks of signature based IDS ?

A. They are unable to detect novel attacks
B. They suffer from false alarms
C. They have to be programmed again for every new pattern to be detected
D. All of the mentioned
Answer» E.
1165.

What are characteristics of signature based IDS ?

A. Most are based on simple pattern matching algorithms
B. It is programmed to interpret a certain series of packets
C. It models the normal usage of network as a noise characterization
D. Anything distinct from the noise is assumed to be intrusion activity
Answer» B. It is programmed to interpret a certain series of packets
1166.

What is major drawback of anomaly detection IDS ?

A. These are very slow at detection
B. It generates many false alarms
C. It doesn’t detect novel attacks
D. None of the mentioned
Answer» C. It doesn’t detect novel attacks
1167.

What are characteristics of anomaly based IDS ?

A. It models the normal usage of network as a noise characterization
B. It doesn’t detect novel attacks
C. Anything distinct from the noise is not assumed to be intrusion activity
D. It detects based on signature
Answer» B. It doesn’t detect novel attacks
1168.

What are the different ways to classify an IDS ?

A. anomaly detection
B. signature based misuse
C. stack based
D. all of the mentioned
Answer» E.
1169.

What are major components of intrusion detection system ?

A. Analysis Engine
B. Event provider
C. Alert Database
D. All of the mentioned
Answer» E.
1170.

What are the different ways to intrude ?

A. Buffer overflows
B. Unexpected combinations and unhandled input
C. Race conditions
D. All of the mentioned
Answer» E.
1171.

What is are two safe computing practices ?

A. Not to open software from unknown vendors
B. Open and execute programs in admin level/root
C. Open and execute programs in presence of antivirus
D. None of the mentioned
Answer» B. Open and execute programs in admin level/root
1172.

What is known as sandbox ?

A. It is a program which can be molded to do desired task
B. It is program that is controlled or emulated section of OS
C. It is a special mode of antivirus
D. None of the mentioned
Answer» C. It is a special mode of antivirus
1173.

How does an antivirus of today identify viruses ?

A. Previously known patterns
B. It can detect unknown patterns
C. It can take high priority to increase scanning speed
D. None of the mentioned
Answer» B. It can detect unknown patterns
1174.

How do viruses avoid basic pattern match of antivirus ?

A. They are encrypted
B. They act with special permissions
C. They modify themselves
D. None of the mentioned
Answer» D. None of the mentioned
1175.

What are two features of a tripwire file system ?

A. It is a tool to monitor file systems
B. It is used to automatically take corrective action
C. It is used to secure UNIX system
D. None of the mentioned
Answer» B. It is used to automatically take corrective action
1176.

Which direction access cannot happen using DMZ zone by default ?

A. Company computer to DMZ
B. Internet to DMZ
C. Internet to company computer
D. Company computer to internet
Answer» D. Company computer to internet
1177.

What is best practice in firewall domain environment ?

A. Create two domain trusted and untrusted domain
B. Create strong policy in firewall to support different types of users
C. Create a Demilitarized zone
D. Create two DMZ zones with one untrusted domain
Answer» D. Create two DMZ zones with one untrusted domain
1178.

What is used to protect network from outside internet access ?

A. A trusted antivirus
B. 24 hours scanning for virus
C. Firewall to separate trusted and untrusted network
D. Deny users access to websites which can potentially cause security leak
Answer» D. Deny users access to websites which can potentially cause security leak
1179.

What is not a important part of security protection ?

A. Large amount of RAM to support antivirus
B. Strong passwords
C. Audit log periodically
D. Scan for unauthorized programs in system directories
Answer» B. Strong passwords
1180.

With regard to DOS attack what is not true from below options ?

A. We can stop DOS attack completely
B. By upgrading OS vulnerability we can stop DOS attack to some extent
C. DOS attack has to be stopped at network level
D. Such attack can last for hours
Answer» B. By upgrading OS vulnerability we can stop DOS attack to some extent
1181.

What is known as DOS attack ?

A. It is attack to block traffic of network
B. It is attack to harm contents stored in HDD by worm spawn processes
C. It is an attempt to make a machine or network resource unavailable
D. None of the mentioned
Answer» D. None of the mentioned
1182.

What are zombie systems ?

A. Are specific system which are designed to attack by manufacturer
B. They are network of known hacking group
C. These systems are previously compromised, independent systems
D. None of the mentioned
Answer» D. None of the mentioned
1183.

Which is not a valid port scan type ?

A. ACK scanning
B. Window scanning
C. IGMP scan
D. FIN scanning
Answer» D. FIN scanning
1184.

Which is not a port scan type ?

A. TCP scanning
B. SYN scanning
C. UDP scanning
D. SYSTEM Scanning
Answer» E.
1185.

What is port scanning ?

A. It is a software used to scan system for attack
B. It is a software application designed to probe a server or host for open ports
C. It is software used to scan system for introducing attacks by brute force
D. None of the mentioned
Answer» C. It is software used to scan system for introducing attacks by brute force
1186.

Who unleashed famous worm attack in 1988 which effected UNIX systems and caused losses in millions ?

A. Robert Morris
B. Bob Milano
C. Mark zuckerberg
D. Bill Gates
Answer» B. Bob Milano
1187.

What is known as masquerading ?

A. When one participant in communication pretends to be someone else
B. When attacker modifies data in communication
C. When attack is of fraudulent repeat of a valid data
D. When attack gains access to remote systems
Answer» B. When attacker modifies data in communication
1188.

Which of the following is not a characteristic of virus ?

A. Virus destroy and modify user data
B. Virus is a standalone program
C. Virus is a code embedded in a legitimate program
D. Virus cannot be detected
Answer» E.
1189.

Which mechanism is used by worm process ?

A. Trap door
B. Fake process
C. Spawn Process
D. VAX process
Answer» D. VAX process
1190.

What is trap door ?

A. IT is trap door in WarGames
B. It is a hole in software left by designer
C. It is a Trojan horse
D. It is a virus which traps and locks user terminal
Answer» C. It is a Trojan horse
1191.

What is Trojan horse ?

A. It is a useful way to encrypt password
B. It is a user which steals valuable information
C. It is a rogue program which tricks users
D. It’s a brute force attack algorithm
Answer» D. It’s a brute force attack algorithm
1192.

What is breach of availability ?

A. This type of violation involves unauthorized reading of data
B. This violation involves unauthorized modification of data
C. This violation involves unauthorized destruction of data
D. This violation involves unauthorized use of resources
Answer» D. This violation involves unauthorized use of resources
1193.

What is theft of service ?

A. This type of violation involves unauthorized reading of data
B. This violation involves unauthorized modification of data
C. This violation involves unauthorized destruction of data
D. This violation involves unauthorized use of resources
Answer» E.
1194.

What is breach of confidentiality ?

A. This type of violation involves unauthorized reading of data
B. This violation involves unauthorized modification of data
C. This violation involves unauthorized destruction of data
D. This violation involves unauthorized use of resources
Answer» B. This violation involves unauthorized modification of data
1195.

What is breach of integrity ?

A. This type of violation involves unauthorized reading of data
B. This violation involves unauthorized modification of data
C. This violation involves unauthorized destruction of data
D. This violation involves unauthorized use of resources
Answer» C. This violation involves unauthorized destruction of data
1196.

What is not a best practice for password policy ?

A. Deciding maximum age of password
B. Restriction on password reuse and history
C. Password encryption
D. Having change password every 2 years
Answer» E.
1197.

What forces the user to change password at first logon ?

A. Default behavior of OS
B. Part of AES encryption practice
C. Devices being accessed forces the user
D. Account administrator
Answer» E.
1198.

What is characteristics of Authorization ?

A. RADIUS and RSA
B. 3 way handshaking with syn and fin
C. Multilayered protection for securing resources
D. Deals with privileges and rights
Answer» E.
1199.

Which happens first authorization or authentication ?

A. Authorization
B. Authentication
C. Authorization & Authentication are same
D. None of the mentioned
Answer» B. Authentication
1200.

What is characteristic of RADIUS system ?

A. It is essential for centralized encryption and authentication
B. It works on Network layer to deny access to unauthorized people
C. It provides centralized authentication mechanism via network devices
D. It’s a strong File access system
Answer» D. It’s a strong File access system