0% found this document useful (0 votes)
245 views

Security in Computing

The document is a quiz on security in computing containing 15 multiple choice questions. It covers topics such as the three D's of security (Defense, Detection, Divide), levels of security assurance, functions of firewalls and packet sniffing, network authentication systems like Kerberos, roles of certification authorities, types of viruses, forms of recovery and spyware, layers of the OSI model, DNS and IPv4/IPv6 addressing, security bugs, session layer vulnerabilities, and ways to intrude systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
245 views

Security in Computing

The document is a quiz on security in computing containing 15 multiple choice questions. It covers topics such as the three D's of security (Defense, Detection, Divide), levels of security assurance, functions of firewalls and packet sniffing, network authentication systems like Kerberos, roles of certification authorities, types of viruses, forms of recovery and spyware, layers of the OSI model, DNS and IPv4/IPv6 addressing, security bugs, session layer vulnerabilities, and ways to intrude systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Class:T.Y.B.Sc.I.

T
Subject:Security in computing
Paper Name: Security in computing
Paper Code: USIT602

1 The three D’s of security


A Defense, Detection ,Divide
B Defend ,Detect ,Dig
C Defense ,Deterrence ,Detection
D Divide ,Disguise ,Detect

2 You are never ____________ percent secure.


A 60
B 90
C 100
D 80

3 What is the function of a firewall?


A protects the computer in case of fire
B Block or screen out spam
C Prevents the CPU from being overheated
D Helps to prevent outsiders from obtaining unauthorized access

4 __________ is the act of capturing packets of data flowing across a


computer network
A packet catching
B packet snipping
C packet sniffing
D packet pulling

5 ___________ is a network authentication system based on the use of


tickets.
A Kerberos
B Railway
C SSL
D TLS

6 A ________________issues, catalogs, renews, and revokes certificates


under the Management of a policy and administrative control.
A Certification authority
B Registration authorithy
C Revocation Authority
D Digital authority

7 If the virus executes, does its damage, and terminates until the next time
it is executed, it is known as a __________________
A nonresident virus
B stealth virus
C overwriting virus
D prepending virus

8 Failure recovery and media recovery fall under ........


A transaction recovery
B database recover
C system recovery
D value recovery

9 Keyloggers are a form of ______________.


A Spyware
B Shoulder surfing
C Trojan
D Social engineering

10 Router operates in which layer of OSI Reference Model?


A Layer 1 (Physical Layer)
B Layer 3 (Network Layer)
C Layer 4 (Transport Layer)
D Layer 7 (Application Layer)

11 DNS is the abbreviation of


A Dynamic Name System
B Dynamic Network System
C Domain Name System
D Domain Network Service

12 IPv4 uses ________ bit addresses while IPv6 uses _________ bit
addresses.
A 32, 64
B 32, 128
C 64, 128
D 128, 256

13 Security bugs are also known as _______


A security defect
B security problems
C system defect
D software error

14 Which of the following is not session layer vulnerability?


A Mishandling of undefined, poorly define
B Spoofing and hijacking of data based on failed authentication attempts
C Passing of session-credentials allowing intercept and unauthorized use
D Weak or non-existent authentication mechanisms

15 What are the different ways to intrude?


A Buffer overflows
B Unexpected combinations
C False conditions
D Anything which is unexpectedly happen

You might also like