🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

cyber security 2.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

1. Which of the following is considered an element of cyber security? Network security Operational security Application security All of the above Show Explanation 2. Identify the type of symmetric key algorithm which uses a streaming cipher to encrypt information. SHA MD5 RC4 Blowfish S...

1. Which of the following is considered an element of cyber security? Network security Operational security Application security All of the above Show Explanation 2. Identify the type of symmetric key algorithm which uses a streaming cipher to encrypt information. SHA MD5 RC4 Blowfish Show Explanation 3. Identify which of the following can be considered instances of Open design. DVD Player CSS Only B Both A and B Show Explanation 4. In which category does compromising confidential information fall? Threat Bug Attack Vulnerability Show Explanation 5. In which category does the lack access control policy fall? Threat Bug Attack Vulnerability Show Explanation 6. Malware stands for? Multipurpose software Malfunctioned software Malicious software Malfunctioning of security Show Explanation 7. PCT stands for _____ Private Communication Technique Private Connecting Technology Private Communication Technology Personal Communication Technology Show Explanation 8. State whether True or False: Data encryption is primarily used to ensure confidentiality. True False Cannot be interpreted None Show Explanation 9. The most common way to maintain data availability? Data clustering Data Altering Data Backup Data Recovery Show Explanation 10. To what does a DNS translate a domain name Hex IP Binary URL Show Explanation 11. Total types of scanning in cyber security is? 1 2 3 4 Show Explanation 12. What is the CIA triad also known as? AIC(Availability, Integrity, Confidentiality) NIC(Non-repudiation, Integrity, Confidentiality) AIN(Availability, Integrity, Non-repudiation) ANC(Availability, Non-repudiation, Confidentiality) Show Explanation 13. What is transformed using cipher algorithms? Scalar text Complex text Plain text None Show Explanation 14. Identify the type of attack which uses a fraudulent server with a relay address. MITM NTLM SMB NetBIOS Show Explanation 15. Which of the following is considered as the unsolicited commercial email? Virus Malware Spam All of the above Show Explanation 16. Which of the following is used for encrypting data at the network level? HTTPS SMTP S/MIME IPSec Show Explanation 17. Which of the following is used for monitoring traffic and analyzing network flow? Managed detection and response Cloud access security broker Network traffic analysis Network security firewall Show Explanation 18. Which of the following platforms is used for the safety and protection of information in the cloud? AWS Cloud workload protection platforms Cloud security protocols One Drive Show Explanation 19. Which of the following suite is used for NTP enumeration? DNS SNMP NTP HTTP Show Explanation 20. Which of the following tool is used in Wi-fi hacking? Aircrack-ng Wireshark Norton None Show Explanation 21. Which one of the following can be considered as the class of computer threats? Dos Attack Phishing Soliciting Both B and C Show Explanation 22. Which protocol is mostly used in Wi-fi security? WPS WPA WPA2 Both b and c. Show Explanation 23. Which software is mainly used to help users detect viruses and avoid them? Antivirus Adware Malware None of the above Show Explanation 24. Why is Code red? Antivirus Virus Word processing software Photo editing software Show Explanation 25. Why is response and transit time used? To measure reliability To measure security To measure longevity To measure performance Show Explanation 26. Why is the proxy server used by a hacker? For obtaining remote access connection Hiding malicious activity on the network Create a ghost server on the network Create a stronger connection with the target Show Explanation 27. Identify the least strong security encryption. WPA2 WEP WPA3 WPA Show Explanation 28. CHAP stands for? Challenge Hardware Authentication Protocols Circuit Hardware Authentication Protocols Challenge Handshake Authentication Protocols Circuit Handshake Authentication Protocols Show Explanation 29. Choose among the following techniques, which are used to hide information inside a picture. Image rendering Steganography Rootkits Bitmapping Show Explanation 30. Choose the default port number for Apache and other web servers. 20 27 80 87 Show Explanation 31. Choose the features which violate cyber security. Exploit Attack Compliance None Show Explanation 32. EDR stands for _____? Endless detection and response Endpoint detection and response Endless detection and recovery Endpoint detection and recovery Show Explanation 33. Full form of TCP/IP? Transmission Control Protocol/ internet protocol Transmission Control Protocol/ internet protocol Transaction Control protocol/ internet protocol Transmission Contribution protocol/ internet protocol Show Explanation 34. Identify among the following which is used to avoid browser-based hacking. Adware remover in browser Incognito mode in the browser Anti-malware in browser Remote browser access Show Explanation 35. Identify the class of computer threats. Phishing DOS attack Soliciting Both B and C Show Explanation 36. Identify the Debian-based OS which has 2 virtual machines and focuses on preserving users’ data. Ubuntu Fedora Whonix Kubuntu Show Explanation 37. Identify the element which is not considered in the triad, according to the CIA. Authenticity Availability Integrity Confidentiality Show Explanation 38. Identify the first computer virus among the following. Blaster Creeper Sasser Both b and c Show Explanation 39. Identify the incorrect type of scanning? SYN Stealth Null Scan Xmas tree Scan Cloud scan Show Explanation 40. Among the following, identify the one which does not need any host program and is independent. Worm Virus Trojan horse Trap door Show Explanation 41. Identify the legal form of hacking. Cracking Non-ethical hacking Ethical hacking Hacktivism Show Explanation 42. Identify the mail transferring methodology which isn’t secured. SSMTP S/MIME POP3 Mail using PGP Show Explanation 43. Identify the malware which does not replicate or clone through an infection? Trojans Worms Rootkits Virus Show Explanation 44. Identify the maximum character which Linux OS supports in its file names. 32 64 128 256 Show Explanation 45. Identify the oldest phone hacking technique used by hackers to make free calls. Spamming Phreaking Cracking Phishing Show Explanation 46. Identify the port used to connect to Active Directory in Windows 2000. 139 445 80 389 Show Explanation 47. Identify the private search engine. Bing Duckduckgo Google Yahoo Show Explanation 48. Identify the security protocol which is not strong. SMTP SSL SFTP HTTPS Show Explanation 49. Identify the term among the following which is the first phase of ethical hacking. Footprinting ARP Poisoning DNS Poisoning Enumeration Show Explanation 50. Identify the term which denotes that only authorized users are capable of accessing the information Confidentiality Availability Integrity Non-repudiation Show Explanation 51. Identify the term which denotes the protection of data from modification by unknown users. Confidentiality Authentication Integrity Non-repudiation Show Explanation 52. Identify the term which denotes the violation of principle if the computer is no more accessible. Access control Availability Confidentiality All of the above

Use Quizgecko on...
Browser
Browser