Security in Computing Unit 1
Security in Computing Unit 1
Unit 1
a) Employees
b) Resources
c) Information
d) Money
Ans: Information
2. Confidential information is available to external audiences only for business-related purposes and only after entering
a or equivalent obligation of confidentiality.
3. Originally, the academic security model was and the government security model was .
4. A approach doesn’t work when you need to allow thousands or millions of people to have access to
the services on your network.
a) closed-door
b) open-door
c) wide-door
d) locked-door
5. An approach doesn’t work when you need to protect the privacy of each individual who interacts with
the services on your network.
a) closed-door
b) open-door
c) wide-door
d) locked-door
Ans: open-door
6. As more companies started doing business on the Internet, concepts such as were developed
to provide business services over the Internet.
a) Software-as-a-Service (SaaS)
b) Virtual private networks (VPNs)
c) Personally identifiable information (PII)
d) Storage as a Service (SaaS)
a) virus outbreak
b) web site outage
c) denial of service (DoS) attack
d) All of the above
e) None of the above
8. means that software and data can be used on multiple platforms or can be transferred/transmitted
within an organization, to a customer, or to a business partner.
a) Portability
b) Accessibility
c) Authority
d) Sharing
Ans: Portability
9. is concerned with protecting information in all its forms, whether written, spoken, electronic,
graphical, or using other methods of communication.
a) Software Security
b) Information Security
c) Network Security
d) Storage Security
10. is concerned with protecting data, hardware, and software on a computer network.
a) Software Security
b) Information Security
c) Network Security
d) Storage Security
12. Without adequate a security breach may go unnoticed for hours, days, or even forever.
a) Detection
b) Deterrence
c) Defense
d) All of the above
Ans: Detection
a) Security program
b) Security framework
c) Planning
d) Security initiatives
15. A security program defines the purpose, scope, and responsibilities of the security organization and
gives formal authority for the program.
a) Charter
b) Memo
c) Document
d) File
Ans: Charter
a) Security program
b) Security framework
c) Security policy
d) Security initiatives
17. change with each version of software and hardware, as features are added and functionality changes,
and they are different for each manufacturer.
a) Standards
b) Rules
c) Application
d) Files
Ans: Standards
18. Guidelines for the use of software, computer systems, and networks should be clearly documented for the sake of
the people who use these technologies.
a) Standards
b) Rules
c) Guidelines
d) Security
Ans: Guidelines
a) Risk Analysis
b) Planning
c) Guidelines
d) Security
20. compares the desired state of the security program with the actual current state and identifies the
differences.
a) Risk Analysis
b) Security Analysis
c) Comparison Analysis
d) Gap Analysis
21. is a plan of action for how to implement the security remediation plans.
a) Charter
b) Outline
c) Roadmap
d) Layout
Ans: Roadmap
22. The documents how security technologies are implemented, at a relatively high level.
a) Charter
b) Security architecture
c) Roadmap
d) Layout
23. The actions that should be taken when a security event occurs are defined in? the incident response plan.
a) Charter
b) Security architecture
c) Roadmap
d) Incident response plan
24. is the process of defense, is the process of insurance, and is deciding that the risk
does not require any action.
25. is a term used to describe where a threat originates and the path it takes to reach a target.
a) Threat vector
b) Origin vector
c) Target vector
d) Trojan vector
Ans: Threat vector
26. refers to a Trojan program planted by an unsuspecting employee who runs a program provided by a
trusted friend from a storage device like a disk or USB stick, that plants a back door inside the network.
a) Threat exploit
b) Friend exploit
c) Girlfriend exploit
d) Trusted exploit
27. Which are the generally recognized variants of malicious mobile code?
a) Viruses
b) Worms
c) Trojans
d) a and b
e) a, b and c
Ans: a, b and c
28. is a self-replicating program that uses other host files or code to replicate.
a) Virus
b) Worm
c) Trojan
d) None of the above
Ans: Virus
29. If the virus executes, does its damage, and terminates until the next time it is executed, it is known as?
a) Temporary virus
b) Resident virus
c) Nonresident virus
d) Stealth virus
a) Permanent virus
b) Memory-resident virus
c) Memory Nonresident virus
d) None of the above
31. Which viruses insert themselves as part of the operating system or application and can manipulate any file that is
executed, copied, moved, or listed?
a) Permanent viruses
b) Memory-resident viruses
c) Memory Nonresident viruses
d) None of the above
Ans: Memory-resident virus
32. If the virus overwrites the host code with its own code, effectively destroying much of the original contents, it is
called?
a) Overwriting virus
b) Stealth virus
c) Nonresident virus
d) Parasitic virus
33. If the virus inserts itself into the host code, moving the original code around so the host programming still remains
and is executed after the virus code, the virus is called?
a) Overwriting virus
b) Stealth virus
c) Prepending virus
d) Parasitic virus
34. Viruses that copy themselves to the beginning of the file are called? prepending viruses
a) Overwriting virus
b) Appending virus
c) Prepending virus
d) Parasitic virus
a) Overwriting virus
b) Appending virus
c) Prepending virus
d) Parasitic virus
36. Viruses appearing in the middle of a host file are labeled? mid-infecting viruses.
a) Mid-infecting viruses
b) Appending viruses
c) Prepending viruses
d) Parasitic viruses
37. Who works by posing as legitimate programs that are activated by an unsuspecting user?
a) Virus
b) Worm
c) Trojan
d) None of the above
Ans: Trojan
38. Which type of Trojans infect a host and wait for their originating attacker’s commands telling them
to attack other hosts.
40. refers to the restriction of access to data only to those who are authorized to use it.
a) Confidentiality
b) Authority
c) Accessibility
d) None of the above
Ans: Confidentiality
a) Perimeter Security
b) Defense in depth
c) Both of the above
d) None of the above
14. _______ occurs when an unauthorized third party captures network packets
destined for computers other than their own.
a. Tracking
b. SQL Injection
c. Sniffing
d. Traffic replay
15. NIC stands for ___________
a. Network Interface Card
b. Network Intermediate Card
c. Network Interface Configuration
d. Network Intermediate Configuration
16. _____ refers to the restriction of access to data only to those who are authorized
to use it
a. Integrity
b. Confidentiality
c. Availability
d. Privacy
17. Perimeter model is like ___________
a. Onion
b. layer
c. lollipop
d. sponge
18. What is the threat from “Windows Shell Command File”?
a. It can execute malicious code
b. It can contain malicious code
c. It can install malicious code
d. It can change security settings
19. A self-replicating program that uses other host file or code to replicate is called
_____
a. Worms
b. Virus
c. Trojan
d. Ransomware
20. How can we defend network from ARP poisoning?
a. Firewall
b. Use Encryption
c. Secure P2P Services
d. Configure Port Rate Limiting
Security in Computing MCQs
Unit II
1.Which mechanism is used for securing access to a given system based on one category of
identification?
a) Encryption
b) Decryption
a) Output Feedback
b) Electronic Codebook
c) Cipher Feedback
d) A and C
4.______ key is used for decrypting the data in public key cryptography.
a) Public
b) Symmetric
c) Private
d) Authorization
Ans. Private
a) Digital Certificate
c) Certificate Authority
d) Registration Authority
6.__________ are used to provide certificate to users, computers and other services.
a) Intermediate CA
b) Root CA
c) Digital Certificate
d) Issuing CA
Ans. Issuing CA
c) Flash Drive
d) USB
8. _________ can be accessed by most computers and other devices on the network
c) Hard Drive
d) Server
9. A __________ is the mechanism an array uses to present its storage to a host operating system
c) Zoning
10. __________ are associated with vulnerabilities and threats pertaining to the privacy and control
of information.
a) Forwarding
b) Availability risks
c) Confidentiality risks
11.A _______ is an attempt to make a computer resource unavailable to its intended users
a) Data Tampering
b) Accidental Modification
c) Data Deletion
a) Insert
b) Select
c) Delete
d) Update
Ans. Select
13.________ removes any current permissions settings for the specified users or roles.
a) Deny
b) Grant
c) Revoke
d) Delete
Ans. Revoke
14. ________ are designed to automatically be “fired” whenever specification actions take place
within a database.
a) Triggers
b) Stored Procedures
c) Views
Ans. Triggers
15.What are the factors that can affect the implementation of backup processes?
a) Storage Space
b) Processing time
c) Network Bandwidth
16._________ backup consists of copying all of the data that has changed since the last backup.
a) Differential backups
c) Full Backup
17._________ is the process by which people prove they are who they say they are
a) Authorization
b) Declaration
c) Authentication
d) Authority
Ans. Authentication
18._________ is a network authentication system based on the use of tickets.
a) MSCHAP
b) Kerberos
c) Central Storage
d) CHAP
Ans. Kerberos
21._________ use hardware- or software-based authenticators that generate a random seed based
on the current time of day
a) Sequential Keys
b) Clock Keys
c) Time-based keys
a) Certificate Authority
a) Read
b) Modify
c) Special Permission
Ans. Cipher
a) Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication
c) Federal Agency Use of Public Key Technology for Digital Signatures and Authentication
a) Symmetric
b) Private
c) Public
d) Single
Ans. Private
27.PKI stands for __________.
29. Windows Server 2008 R2 introduced version ____ templates, which add support for the newer
Microsoft Crypto-API, giving administrators the ability to produce certificates using the more
advanced and secure elliptic curve cryptography (ECC) cryptography service providers (CSPs).
a) 2
b) 1
c) 4
d) 3
Ans. 3
a) CA Manager
b) CA Controller
c) CA Administrator
d) A and C
Ans. A and C
b) Arrays
c) Servers
32. Reproduction of traffic and data that was previously sent on a network is called ________.
a) Packet replay
b) Packet Sniffing
c) Espionage
a) Cost of downtime
a) Full backups
b) Half backups
Ans. A and B
a) Downtime
b) Outage
c) Breakdown
d) Modification
Ans. Outage
a) Data Leakage
b) Fraud
39. A _________ issues, catalogs, renews, and revokes certificates under the management of a
policy and administrative control
b) Digital Certificate
c) CA Manager
d) Root CA
Ans: Authentication
3) Which technologies may be considered by the design team to prevent one application from
consuming too much of bandwidth?
b. Software-as-a-Service(SaaS)
d. Quality of Service(QoS)
Ans: Three
Ans: Performance
7) Which architecturing approach offers higher performance and lower cost but also brings
special security considerations into play.
d. Firewalls
Ans: TCP/IP
10) MAC addresses are ____ bit hexadecimal numbers that are uniquely assigned to each
hardware network interface by the manufacturer.
a. 8 b. 24 c. 48 d. 64
Ans: 48
a. 8 b. 32 c. 64 d. 128
Ans: 32
a. 128 b. 32 c. 24 d. 64
Ans: 128
13) The host uses the ________ , which functions by sending a broadcast message to the
network that basically says, “ Who has 192.168.2.10, tell 192.168.2.15”.
15) ______ an OSI-model layer is used to convert application data into acceptable and
compatible formats for transmission. At this layer, data is encrypted and encoded and encrypted.
Ans: Presentation
Ans: HTTP
17) Which layer provides mechanism for two host to maintain network connections .
18) Which layer provides unique address to every host on the network .
19) _____ layer is composed of two sub layers : Media Access Control (MAC) and Logical Link
Control (LLC).
Ans: Data-link
20) As the size of the network increases, the distance and time a packet is in transmit over the
network also ________ , making collision more likely.
Ans: Increases
21) Routers and switches operate at layers ___ and ___ respectively.
a. Two and three b. Three and Two c. One and Two d. Three and Four.
22) In which two ways routers learn the locations of various networks ?
23) What are the two main types of layer three (Routing) protocols?
b. Network Modelling
d. Patching
Ans: Patching
25) What can be configured to permit or deny TCP, UDP, or other types of traffic based on the
source or the destination address.
c. Patching
26) Which one of the following comes under Disabling Unused Services?
b. Administrative Practises
c. Proxy ARP
d. Patching
27) _______ provides a mechanism for reporting TCP/IP communication problems, as well as
utilities for testing IP layer connectivity.
28) Whose function is to screen network traffic for the purpose of preventing unauthorized access
between computer networks?
a. Firewalls
b. Network Analysis
c. Documentation
Ans: Firewalls
29) Different types of software administrators are concerned about that could violate security
policies.
b. Web mail
c. Remote access
a. Remote Access
b. Application Awareness
c. a & b both
32) What is the mask for IP address 192.168.0.0 as per Private Addresses specified in RFC1918?
a. 255.0.0.0
b. 255.240.0.0
c. 255.255.0.0
Ans: 255.255.0.0
33) In which of the following way Modern Firewalls assist other areas of network quality and
performance?
c. a & b both
a. Network layer
b. Physical layer
d. Transport layer
a. Battery operated
b. War driving
c. Evil Twin
a. War chalking
b. WEP cracking
c. both a&b
39) In which of the following way(s) wireless network security can be enhanced
40) Which of the following is/are fundamental component(s) of Wireless Intrusion Prevention
System.
a. Sensors
b. Management Servers
c. Database server
Unit III
1. Network analysis, architecture and design are processes used to produce designs
that are _____
a. logical
b. reproducible
c. available
d. attacking
2. Following statements are right about Acceptable risks
a. It is management’s responsibility to set their company’s level of risk
b. It is security professional’s responsibility to set their company’s level of risk
c. Acceptable risk is derived from legal and regulatory compliance responsibilities
etc.
d. Not all companies have acceptable risk
3. ___________ and ___________ systems are used to control traffic of the network
a. Authentication
b. Authorization
c. Firewall
d. Network Traffic control
4. _________ is a network not available to outside world, only those who are granted
can access network for sharing and viewing purpose
a. Extranet
b. Intranet
c. Internet
d. PBX
5. In DMZ configuration the____ layer consists web server that interacts with end
users whereas the _____ layer contains logic necessary for processing those queries
and extracting the data that is stored in DB.
a. Presentation, session
b. Session, presentation
c. Application, presentation
d. Presentation, application
6. Media Access Control (MAC) is also known as _____, _______
a. Internet Address
b. Hardware Address
c. Physical Address
d. Network Address
7. _______________ is one of the most effective and hard-to-defend attack technique.
a. Hijacking
b. Packet Sniffing
c. ARP Poisoning
d. Data Theft
8. Select two protocols of Application layer
a. IMAP
b. POPS
c. UDP
d. TCP
9. Select two protocols of Transport layer
a. IMAP
b. POPS
c. UDP
d. TCP
10. Which of the following two services uses TCP protocol?
a. SNMP Traps
b. DNS(queries)
c. Telnet
d. FTP
11. Which of the following are routing Protocol?
a. ICMP
b. RIP
c. OSPF
d. HTTP
12. Which 2 protocols are required by access devices to perform device-level AAA
communication?
a. RADIUS
b. SNMP
c. TACACS
d. UDP
13. Echo request, replies are more commonly known as ____
a. Reiteration
b. Reverberation
c. Resounding
d. Ping
14. ____________ is a type of attack in which the attacker sends ICMP traffic to the
broadcast address of a number of large network, inserting the source address of
the victim
a. Data Theft
b. Smurf
c. Broadcast Attack
d. MITM Attack
15. Firewall can be implemented as __________
a. Software only
b. Hardware only
c. Hardware and Software both
d. Combination of hardware and Software
16. ______ message occurs when a host sends a datagram to its(destination) gateway,
which in turn forwards the same datagram to the next gateway and this second
gateway is on the same network host
a. Fail
b. Redirect
c. Forwarded
d. Rejected
17. Which of the following are advanced capabilities of firewalls?
a. Block Traffic
b. Granular Application Control
c. Application Awareness
d. None of the above
18. Which of the following statements are incorrect about the Firewall?
a. Firewall cannot alert appropriate people of specific events
b. Firewalls can stop social engineering attacks
c. It can install malicious code
d. It can change security settings
Ans: NIDS
2) Which of the following is/are Intrusion Detection (ID) system when it checks files and disks
for known malware?
a. Firewalls b. Antivirus c. Both a & b d. None of the above
Ans: Patching
4) _____ is an independent platform that identifies intrusions by examining network traffic and
monitors multiple hosts.
a. Stack-Based Intrusion Detection System (SIDS)
b. Network Intrusion Detection System (NIDS)
c. Host-Based Intrusion Detection System (SIDS)
d. None of the above
10) Which of the following is true for Intrusion Detection System (IPS)?
a. They are placed in-line
b. They are able to actively block intrusions that are detected
c. Takes actions such as sending an alarm, dropping the malicious packets, etc.
d. All of the above
11) _____ is an approach to security management that combines SIM (Security Information
Management) and SEM (Security Event Management).
a. SIEM
b. SOAR
c. UEBA
d. None of the above
Ans: SIEM
12) Which of the following is the most important feature to review when evaluating SIEM
products?
a. Testing
b. Threat Intelligence feeds
c. Aggregation
d. All of the above
16) _____ switches calls between enterprises users on local lines while allowing all users to
share certain number of external phone lines.
a. POT
b. PBX
c. TEM
d. All of the above
Ans: PBX
18) Which of the following defines Microsoft’s Trust worthy computing technique?
a. Memory curtaining
b. Remote attestation
c. Sealed storage
d. All of the above
Ans: BIOS
20) Which of the following does not define Jericho Security Model?
a. Integration
b. Simplifies use of public networks
c. It has a real open security framework
d. Aimed for open solution building blocks
Unit IV
1. IDS stands for ________
a. Internet Detection System
b. Intrusion Detection System
c. Information Detection System
d. Intrusion Detection Service
2. SIEM stands for _______
a. Security Information and Event Management
b. Service Information Exchange Management
c. Security Intrusion Event Management
d. Security Information Exchange Management
3. ______ is a device or software application that monitors a network or system for
malicious activity or policy violation.
a. Host-based Intrusion Detection System
b. Intrusion Prevention System
c. Security Information and Event Management
d. Intrusion Detection System
4. IDS and ______ are important tools in a computer security arsenal.
a. Network-based Intrusion Detection System
b. Host-based Intrusion Detection System
c. Intrusion Prevention System
d. Security Information and Event Management
5. PSTN stands for _________
a. Private Switch Telecom Network
b. Public Switched Telephone Network
c. Public Service Telephone Network
d. Private System Telecom Network
6. VoIP stands for __________
a. Voice on Internet Protocol
b. Voice of Internal Protocol
c. Voice on Inter Protocol
d. Voice over Internet Protocol
7. TDM stands for _____
a. Time Division Multiplexing
b. Time Divide Management
c. Time Division Management
d. Time Depend Message
8. ACL stands for ______
a. Access Control List
b. Application Control List
c. Application Complex List
d. Access Control Least
9. MCU stands for _________.
a. Multi-Call Unit
b. Multi-Conference Unit
c. Multiple Choice Unit
d. Multiple Cell Unit
10. TEM stands for ________
a. Telecom Expense Management
b. Time Exchange Management
c. Telecommunication Export Management
d. Time Export Management
11. MAC stands for __________
a. Main Access Control
b. Mandatory Access Control
c. Management Access Control
d. Mandatory Appeal Contact
12. DACL stands for _________
a. Discretionary Access Control List
b. Discrete Access Complex List
c. Direct Access Complex List
d. Discrete Access Control List
13. RABC stands for ________
a. Right Bound Access Control
b. Rule Bind Access Control
c. Rule-Based Access Control
d. Role Based Access Control
14. TCSEC stands for ________
a. Trusted Computer System Evolution Criteria
b. Time Complex System Evaluation Criteria
c. Time Correction System Evolution Criteria
d. Trusted Computer System Evaluation Criteria
15. PP stands for ______
a. Protection Profile
b. Probability Protection
c. Protection protocol
d. Private Profile
16. ST stands for _______
a. Security Time
b. Service Time
c. Security Target
d. Security Tax
17. HIDS stands for _____
a. House-based Intrusion Detection System
b. Host-based Information Detection System
c. House-based Information Detection System
d. Host-based Intrusion Detection System
18. ______ is often known as a reversed version of Bell-LaPadula
a. Biba
b. TCSEC
c. Clark-Wilson
d. Security Target
19. ______ is computer-based switch that can be thought of as a local phone
company
a. Denial of Service
b. Private Branch Exchange
c. Voicemail
d. Telecom Expense Management
20. _______ can be network-based or host-based
a. Intrusion Prevention System
b. Intrusion Detection System
c. Private Branch Exchange
d. Protection Profile
SIC Unit V MCQs
1. A ____________ is a computer file, typically called an image, which behaves like an actual
computer.
a) Executable (exe)
b) Virtual Machine
c) Cloud
d) Firewall
2. ____________ provided us means by which we can access the applications as utilities over the
internet.
a) Artificial Intelligence
b) Virtual Machine
c) Cloud Computing
d) Internet of Things
a) System as a Service
b) Security as a Service
c) Safety as a Service
d) Software as a Service
a) Platform as a Service
b) Software as a Service
c) Infrastructure as a Service
d) Security as a Service
a) Software as a Service
b) Infrastructure as a Service
c) Platform as a Service
d) Security as a Service
6. The ____________ is a different way to build products; it places security front and center during
the product or application development process.
b) SCRUM
c) Cyber Infrastructure
a) Implementation or coding
b) Design phase
c) Test phase
d) Requirements phase
a) Username
b) Email address
c) Contact Number
d) Password
Ans: Password
10. It is a beneficial to run web applications using ____________ privileges.
a) Least
b) Most
c) Medium
d) Administrative
Ans: Least
11. ____________ client applications are web-based application which can be accessed on the
internet using a browser.
a) Thick
b) Cloud
c) Computing
d) Thin
Ans: Thin
a) Server side
b) Cloud
c) Client side
d) Virtual machine
a) Server side
b) Client side
c) Cloud
d) Virtual machine
14. Which vulnerability among these is applicable for both thin client and thick client applications?
b) Clickjacking attacks
c) Reverse Engineering
15. Using a sysinternal tool called ____________, we can identify the files and registries used by a
particular thick client application.
a) Autologon
b) Process Monitor
c) MoveFile
d) TCPView
a) Process Monitor
b) File Monitor
c) Wireshark
d) Service Monitor
a) SQL Injection
d) Session Hijacking
a) Broadcast
b) Unencrypted
c) Encrypted
d) Open
Ans: Encrypted
20. It is a good security measure to use ____________ to restrict access to remote desktop listening
ports.
a) Firewall
b) Antivirus
c) Encryption
Ans: Firewall
d) Deterrence mechanism
23. NAP stands for ____________, which is used with Remote Desktop (RD) gateway.
24. ____________ is the protection of personnal, hardware, software, networks and data from
physical actions and events that could cause serious loss or damage to an enterprise, agency or
institution.
a) Cloud Security
b) Physical Security
c) Network Security
d) Application Security
a) Defense in Depth
b) Encryption
c) Disaster Recovery
d) Data Backup
a) Security
b) Revenue
c) Asset
d) Infrastructure
Ans: Asset
27. ____________ outline the qualities of an asset that are important to protect.
a) Security Report
b) Security Requirements
c) Security Design
d) Security Test
a) Connection
b) Control
c) Configuration
d) Confidentiality
Ans: Confidentiality
29. RFID stands for ____________, which is used as an access mechanism for securing assets.
30. ____________ is a method/technique used by an unauthorized person who enters the premises
by following the authorized person.
a) Phishing
b) Baiting
c) Tailgating
d) Smishing
Ans: Tailgating
31. CCTV stands for ____________, which are used in electronic monitoring for securing assets.
32. ____________ is a technology for measuring and analyzing biological data of a human body such
as fingerprints, eye retinas, voice patterns, etc.
a) Motion Sensor
b) CCTV
c) Biometrics
d) RFID Reader
Ans: Biometrics
33. ____________ is a pattern recognition system where a biological pattern is analyzed, matched
and processed for further actions.
a) Discriminant Analysis
b) Biometric System
c) Signal Processing
d) Predictive Analysis
a) Processing
b) Analyzing
c) Enrollment
d) Recognition
Ans: Enrollment
35. In ____________ biometrics, thickness and location of veins in a person's hand are used as
features.
a) Signature
b) Hand
c) Iris
d) Vascular pattern
36. ____________ are used in data centers to alert about temperature changes, water leakeages,
humidity increases, etc.
b) Programmable Locks
c) Motion Sensors
d) Electric fences
a) Critical assets
b) Inventory assets
c) Operating assets
d) Non-current assets
38. Which is an important factor to consider when selecting a new location for security?
a) Population
b) Competition
c) Pollution
d) Environment
Ans: Competition
39. The unauthorized disclosure of ____________ type of assets can cause grievous damage to the
national security
a) Confidential
b) Top secret
c) Unclassified
d) Secret
a) Software as a Service
b) Platform as a Service
c) System as a Service
d) Infrastructure as a Service
***************************************************************************