Chap No.1: Introduction To Computer Security and Security Trends

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11
At a glance
Powered by AI
The document discusses various computer security concepts including confidentiality, integrity, authentication, availability, viruses, worms, trojans, denial of service attacks, and spoofing. It also covers cryptographic techniques like DES and Caesar cipher. Identification, authentication, and access control methods like biometrics and role-based access control are explained.

The document discusses different types of attacks like denial of service attacks (smurfing, email bombing, ping storm), spoofing, brute force attacks, and man-in-the-middle attacks (sniffing). It also covers social engineering techniques like dumpster diving, tailgating and pretexting.

Some common techniques discussed that are used during penetration testing include footprinting (gathering information), vulnerability scanning, brute force attacks, and mechanisms to replay known attacks and record system responses.

Chap No.

1: Introduction to computer security and


security trends.

1. When you use the word _____ it means you are protecting your data from getting
disclosed.
a) Confidentiality
b) Integrity
c) Authentication
d) Availability

2. Attack in which a user creates a packet that appears to be something else.


a) Smurfing
b) Trojan
c) E-mail bombing
d) Spoofing

3. _______ of information means, only authorized users are capable of accessing the
information.
a) Confidentiality
b) Integrity
c) Non-repudiation
d) Availability

4. A program that copies itself.


a) Worm
b) Virus
c) Trojan
d) Bomb

5. A malicious code hidden inside a seemingly harmless piece of code.


a) Worm
b) Bomb
c) Trojan Horse
d) Virus
6. Sniffing is used to perform ______________ fingerprinting.
A. Passive stack
B. Active stack
C. Passive banner grabbing
D. Scanned

7. _____________ is a special type of vulnerability that doesn’t possess risk.


a) Vulnerabilities without risk
b) Vulnerabilities without attacker
c) Vulnerabilities without action
d) Vulnerabilities no one knows

8. A ___________ is a method in which a computer security mechanism is bypassed


untraceable for accessing the computer or its information.
a) front-door
b) backdoor
c) clickjacking
d) key-logging

9. An attack in which the site is not capable of answering valid request.


a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm
Chap No.2: Identification, Authentication and
Operational Security

10. Which of the following is the technique used to look for information in trash or around
dustbin container?
a) Pretexting
b) Baiting
c) Quid Pro Quo
d) Dumpster diving

Correct Answer: Dumpster diving


11. A _____________ attack one of the simplest processes of gaining access to any
password-protected system.
a) Click jacking
b) Brute force
c) Eavesdropping
d) Waterhole

Correct Answer: Brute force


12. In role-based access control, each user is assigned one or more roles, and the roles
determine which parts of the system the user is allowed to access.
a. True
b. False

Correct Answer: True


13. Which of the following is not Biometrics technique
A. Finger prints
B. Retina
C. Face
D. Palm print

Correct Answer: Palm print


14. What is foot printing?

A. Measuring the shoe size of an ethical hacker


B. Accumulation of data by gathering information on a target
C. Scanning a target network to detect operating system types
D. Mapping the physical layout of a target’s network

Correct Answer: Accumulation of data by gathering


information on a target
15. Tailgating is also termed as ___________
a) Piggybacking
b) Pretexting
c) Phishing
d) Baiting

Correct Answer: Piggybacking


16. Security features that control that can access resources in the OS.
a) Authentication
b) Identification
c) Validation
d) Access control

Correct Answer: Access control


17. Passwords need to be kept encrypted to protect from such offline attacks.
a) True
b) False

Correct Answer: True


Chap No.3: Cryptography
18. Under DES, the data encryption standard took a 64-bit block of data and subjected it to
______ levels of encryption.
a) 64
b) 8
c) 16
d) 4

Correct Answer: 16
19. Use Caesar’s Cipher to decipher the following
HQFUBSWHG WHAW
a) ABANDONED LOCK
b) ENCRYPTED TEXT
c) ABANDONED TEXT
d) ENCRYPTED LOCK

Correct Answer: ENCRYPTED TEXT

20. An electronic document that establishes your credentials when you are performing
transactions.
a) Digital code
b) OTP
c) E-mail
d) Digital certificate

Correct Answer: Digital certificate

21. When a hash function is used to provide message authentication, the hash function
value is referred to as
a) Message Field
b) Message Digest
c) Message Score
d) Message Leap

Correct Answer: Message Digest


22. To hide information inside a picture, what technology is used?
A. Rootkits
B. Bitmapping
C. Steganography
D. Image Rendering

Correct Answer: Steganography


23. Study of creating a d using encryption and decryption techniques.
a) Cipher
b) Cryptography
c) Encryption
d) Decryption

Correct Answer: Cryptography


Chap No.4: Computer Security Technology and
Intrusion Detection
24. SMTP stands for ________
a) Service Message Transmission Permission
b) Secure Message Transfer Protocol
c) Simple Mail Transfer Protocol
d) Simple Message Transfer Protocol

Correct Answer: Simple Mail Transfer Protocol


25. In the SSL Protocol, each upper layer message if fragmented into a maximum of
__________ bytes.
a) 216
b) 232
c) 214
d) 212

Correct Answer: 214


26. The PPP protocol _________
a) Is designed for simple links which transport packets between two peers
b) Is one of the protocols for making an Internet connection over a phone line
c) Is designed for simple links which transport packets between two peers and making
an Internet connection over a phone line
d) Is used for sharing bandwidth

Correct Answer: Is designed for simple links which


transport packets between two peers and making an
Internet connection over a phone line

27. Firewall examines each ____________ that are entering or leaving the internal network.
a) emails users
b) updates
c) connections
d) data packets

Correct Answer: data packets


28. ___________ Firewalls are a combination of other three types of firewalls.
a) Packet Filtering
b) Circuit Level Gateway
c) Application-level Gateway
d) Stateful Multilayer Inspection

Correct Answer: Stateful Multilayer Inspection


29. In tunnel mode IPsec protects the
A. Entire IP packet
B. IP header
C. IP payload
D. None of the mentioned

Correct Answer: Entire IP packet


30. IDS follow a two-step process consisting of a passive component and an active
component. Which of the following is part of the active component?
a) Inspection of password files to detect inadvisable passwords
b) Mechanisms put in place to reenact known methods of attack and record system
responses
c) Inspection of system to detect policy violations
d) Inspection of configuration files to detect inadvisable settings

Correct Answer: Mechanisms put in place to reenact


known methods of attack and record system responses

31. Which of the statements are not true to classify VPN systems?
a) Protocols used for tunneling the traffic
b) Whether VPNs are providing site-to-site or remote access connection
c) Securing the network from bots and malwares
d) Levels of security provided for sending and receiving data privately

Correct Answer: Securing the network from bots and


malwares
32. For a client-server authentication, the client requests from the Kerberos Key Distribution
Center a ________ for access to a specific asset.
a) ticket
b) local
c) token
d) user

Correct Answer: ticket


33. For secure connection, Remote access VPNs rely on ___________ and ____________
a) IPSec, SSL
b) L2TP, SSL
c) IPSec, SSH
d) SSH, SSL

Correct Answer: IPSec, SSL


Chap No.5: IT Act and Cyber law
34. What is the name of the IT law that India is having in the Indian legislature?
a) India’s Technology (IT) Act, 2000
b) India’s Digital Information Technology (DIT) Act, 2000
c) India’s Information Technology (IT) Act, 2000
d) The Technology Act, 2008

Correct Answer: India’s Information Technology (IT)


Act, 2000
35. What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act
holds?
a) Cracking or illegally hack into any system
b) Putting antivirus into the victim
c) Stealing data
d) Stealing hardware components

Correct Answer: Cracking or illegally hack into any


system
36. An attack in which the user receives unwanted amount of e-mails.
a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm

Correct Answer: E-mail bombing


37. The act of unauthorized copying or downloading of a program from a network and
making multiple copies of it is
a. Plagiarism
b. Network piracy
c. Software piracy
d. Site-license piracy

Correct Answer: Software piracy


Chap No.6: Application and Web Security
38. Which of the following is not an appropriate way to compromise web servers?
a) Misconfiguration in OS
b) Using network vulnerabilities
c) Misconfiguration in networks
d) Bugs in OS which allow commands to run on web servers

Correct Answer: Using network vulnerabilities


39. Why did SSL certificate require in HTTP?
a) For making security weak
b) For making information move faster
c) For encrypted data sent over HTTP protocol
d) For sending and receiving emails unencrypted

Correct Answer: For encrypted data sent over HTTP


protocol
40. The Secure Electronic Transaction protocol is used for
A. credit card payment
B. Cheque payment
C. electronic cash payments
D. payment of small amounts for internet services

Correct Answer: Credit card payment

You might also like