41_MCQ's With Solutions
41_MCQ's With Solutions
41_MCQ's With Solutions
A’s
Prof Ramkrishna More Arts,Commerce and Science College,Akurdi Pune-44
3. The internal code of any software that will set of a malicious function when specified
conditions are met, is called
a) logic bomb
b) trap door
c) code stacker
d) none of the mentioned
Answer:a
7. Which one of the following is not an attack, but a search for vulnerabilities to attack?
a) denial of service
b) port scanning
c) memory access violation
d) dumpster diving
Answer:b
11. In computer security, ………. means that computer system assets can be modified only by
authorized parities.
A) Confidentiality
B) Integrity
C) Availability
D) Authenticity
Answer:- B) Integrity
12. In computer security, ……… means that the information in a computer system only be
accessible for reading by authorized parities.
A) Confidentiality
B) Integrity
C) Availability
D) Authenticity
Answer:- A) Confidentiality
13. The type of threats on the security of a computer system or network are ……………………..
i) Interruption ii) Interception iii) Modification
iv) Creation v) Fabrication
A) i, ii, iii and iv only
B) ii, iii, iv and v only
C) i, ii, iii and v only
D) All i, ii, iii, iv and v
Answer:- C) i, ii, iii and v only
14. Which of the following is independent malicious program that need not any host program?
A) Trap doors
B) Trojan horse
C) Virus
D) Worm
Answer:- D) Worm
15. The ……….. is code that recognizes some special sequence of input or is triggered by being
run from a certain user ID of by unlikely sequence of events.
A) Trap doors
B) Trojan horse
C) Logic Bomb
D) Virus
Answer:- A) Trap doors
16. The …………….. is code embedded in some legitimate program that is set to “explode”
when certain conditions are met.
A) Trap doors
B) Trojan horse
C) Logic Bomb
D) Virus
Answer:- C) Logic Bomb
17. Which of the following malicious program do not replicate automatically?
A) Trojan Horse
B) Virus
C) Worm
D) Zombie
Answer:- A) Trojan Horse
18. …………… programs can be used to accomplish functions indirectly that an unauthorized
user could not accomplish directly.
A) Zombie
B) Worm
C) Trojan Horses
D) Logic Bomb
Answer:- C) Trojan Horses
20. A ………….. is a program that can infect other programs by modifying them, the
modification includes a copy of the virus program, which can go on to infect other programs.
A) Worm
B) Virus
C) Zombie
D) Trap doors
Answer:- B) Virus
21. First model design for the information security is _______
a. Bell-lapadula model
b. Biba Model
c. Clark-Wilson Model
d. Chinese Wall model
Ans:A
22.The main important thing about Biba model is _________
a. Confidentiality
b. Integrity
c. Availability
d. Preventing the data
Ans:B
23.Ability to read information, access the information from company you want only once is the
goal of ___________
a. Bell-lapadula model
b. Biba Model
c. Clark-Wilson Model
d. Chinese Wall model
Ans:D
Ans:-A
27.) The primary goal of the ………………….. protocol is to provide a private channel between
communicating application, which ensures privacy of data authentication of the partners, and
integrity.
A) SSL
B) ESP
C) TSL
D) PSL
Ans:-A
28) The ……………. is used to provide integrity check, authentication and encryption to IP
datagram.
A) SSL
B) ESP
C) TSL
D) PSL
Ans:-B
31) On the upper layer of SSL, a protocol for initial authentication and transfer of encryption
keys, called the …………………
A) SSL handshake protocol
B) SSL authentication protocol
C) SSL record protocol
D) SSL cipher protocol
Ans:-A
34)Authentication refers to :
[A] methods of restricting user access to system [B] controlling access to portions of database [C]
controlling the operation on the data [D] all of the above
Ans:-D
35)Data integrity means :
[A] providing first access to stored data [B] ensuring correctness and consistency of data [C]
providing data sharing [D] none of the above
Ans:-B
36. Operating system security is the process of ensuring OS integrity, confidentiality and
____________.
a) Threats b) virus c) techniques d) availability
Ans: d
37. In computer security a __________ is a weakness which allows an attacker to reduce a
systems information assurance.
a) Vulnerability b) integrity c) hacking d) risk
Ans: a
38. __________ is an exampleof vulnerabilities.
a) The personnel b) Hardware c) Software d) All of the above
Ans: d
39. ________ is a common type of software flaws that lead to vulnerabilities.
a) SQL injection b) social engineering c) management d) firewalls
Ans: a
40. Microsoft no longer provides updates for __________ operating system.
a)Windows XP b) Apple c) Linux d) Windows NT
Ans : a
Ans :-c
43. ___________ Software is a computer software used to prevent , detect and remove
malicious software.
a) Antivirus b) OS c) virus d) none of the above
Ans : a
44. __________ is an example of virus.
a) Hacking b) Sunday c) Avast d) all of the above
Ans : b
45. __________ is an utility to check the integrity of windows 7 OS.
a) Patches b) antivirus c) system file checker d) Avast
Ans : c
46. File virus attaches itself to the
a) source fileb) object filec) executable filed) all of the above
Ans: c
47. ________ may be classified as Vulnerability
a) Security b) computer security c) security risk d) attacker
Ans : c
48. Top Vulnerabilities to unix system are __________.
a) Send mail b) SSH c) SNMP d) all of the above
Ans : d
49. ________ is an example of antivirus software.
a) W97M b) Quick Heal c) Cascade d) none of the above
Ans : b
50. A secret word or number used to gain access to a computer system is called …………
a) Passwordb) Active numberc) Vaccined) Code number
Ans: a
51. _________ scans your computer and provides a list of updates.
a) Linux updates b) patches c) windows updates d) none of the above
Ans : c
54) In IEEE 802.11 a station with ______mobility can move from one BSS to another,
but the movement is confined inside one ESS.
a) ESS – transition
b) No-transition
c) BSS-transition
d) None of the above
ans :-c)
55) In IEEE 802.11 a __is made of stationary or mobile wireless stations and an optional
central base station known as the access point (AP)
a) BSS
b) CSS
c) ESS
d) None of the above
ans :-a)
57) A Bluetooth network consists of primary devices and upto ___ secondary devices.
a) One; seven
b) One ; Five
c) Five ; Three
d) Two ; Six
ans :-a)
59) In IEEE 802.11 the mac layer frame has ____ fields.
a) Four
b) Six
c) Five
d) None of the above
ans :-d)
60) In IEEE 802.11 communication between two stations in two different BSSs usually
occurs via two ___
a) ESSs
b) Aps
c) BSSs
d) None of the above
ans :-b)
61) Bluetooth is a ____ technology that connects devices in small area
a) VLAN
b) Wired LAN
c) Wireless LAN
d) None of the above
ans :-c)
63) _________ uniquely identifies the MIME entities uniquely with reference to multiple
contexts.
a. Content description.
b. Content -id.
c. Content type.
d. Content transfer encoding.
Answer: B.
64) The processed S/MIME along with security related data is called as ________.
a. public key cryptography standard.
b. private key cryptography standard.
c. S/MIME.
d. MIME.
Answer: A.