Chap No.1: Introduction To Computer Security and Security Trends
Chap No.1: Introduction To Computer Security and Security Trends
Chap No.1: Introduction To Computer Security and Security Trends
1. When you use the word _____ it means you are protecting your data from getting
disclosed.
a) Confidentiality
b) Integrity
c) Authentication
d) Availability
3. _______ of information means, only authorized users are capable of accessing the
information.
a) Confidentiality
b) Integrity
c) Non-repudiation
d) Availability
10. Which of the following is the technique used to look for information in trash or around
dustbin container?
a) Pretexting
b) Baiting
c) Quid Pro Quo
d) Dumpster diving
Correct Answer: 16
19. Use Caesar’s Cipher to decipher the following
HQFUBSWHG WHAW
a) ABANDONED LOCK
b) ENCRYPTED TEXT
c) ABANDONED TEXT
d) ENCRYPTED LOCK
20. An electronic document that establishes your credentials when you are performing
transactions.
a) Digital code
b) OTP
c) E-mail
d) Digital certificate
21. When a hash function is used to provide message authentication, the hash function
value is referred to as
a) Message Field
b) Message Digest
c) Message Score
d) Message Leap
27. Firewall examines each ____________ that are entering or leaving the internal network.
a) emails users
b) updates
c) connections
d) data packets
31. Which of the statements are not true to classify VPN systems?
a) Protocols used for tunneling the traffic
b) Whether VPNs are providing site-to-site or remote access connection
c) Securing the network from bots and malwares
d) Levels of security provided for sending and receiving data privately