Sic Main Final MCQ
Sic Main Final MCQ
2 Viruses infect the data running on top of an application by using the program’s
macro or scripting language
a. Boot sector
b. Macro
c. Computer worm
d. Trojans
Correct answer: b. Macro
13 The process of manipulating a web application to run SQL commands sent by an attacker
is referred as
a. SQL injection
b. MAC injection
c. Phishing
d. DNS Spoofing
Correct answer: a. SQL injection
Unit 1 Chap 3
16 What does CIA stand for?
A. Confidentiality, Integrity, Availability
B. Central Intelligence Agency
C. Cyber security, Investigation Agency
D. Cyber security, Internet, Accessibility
Answer: A Confidentiality, Integrity, Availability
17 means protecting the data from getting disclosed to those who are not authorized
to use it.
A. Integrity
B. Authorization
C. Confidentiality
D. Availability
Answer: C Confidentiality
19 means that the sender must not be able to deny sending a message that he /
she has sent.
A. Authentication
B. Integrity
C. Confidentiality
D. Non-repudiation
Answer: D Non-
repudiation
20 Which direction access cannot happen using DMZ zone by default?
A. Company computer to DMZ
B. Internet to DMZ
C. Internet to company computer
D. Company computer to Internet
Answer: C Internet to company computer
26 What is IEAK?
A. Internet Explorer Access Kit
B. Internet Explorer Administrative Kit
C. Internal Exclusive Access Kit
D. Internal E - Access Kit
Answer: B Internet Explorer Administrative Kit
27 Folders and files accessed remotely over the network should have to be applied
using the principle of least privilege and complex password.
A. DACLs
B. Email
C. SMB
D. FTP
Answer: A DACLs
28 Firewall examines each that are entering or leaving the internal network.
A. Updates
B. Email users
C. Connections
D. Data packets
Answer: D Data
packets
29 SSL stands for?
A. Secured Socket Layer
B. Secured Shell Layer
C. System Socket Layer
D. System Secured Layer
Answer: A Secured Socket Layer
Chap 4
31 What is Authentication?
A. Encryption
B. Proof of Identity
C. Access
D. Modification
Ans. B
37 What is the problem with Secure Socket Layer based authentication method?
A. Protection of the private key is very important
B. Key generation
C. No privacy
D. Different attacks
Ans. A
39 What special is required for Smart cards to provide communication between the
smart cards and the computer systems?
A. Smart Chip
B. Smart Pin
C. Smart Card Reader
D. Smart Card
Ans. C
40 Which EAP type is used for TLS authentication protocol to provide the ability to use
smart cards for remote authentication?
A. EAP/TLS
B. EAP/MD5-CHAP
C. EAP/MD5
D. EAP/CMOS
Ans. A
41 Which protocol is available for most versions of Unix as well as for Windows systems?
A. IPSEC
B. SSL
C. RBAC
D. SS
H Ans. D
44 Where is the Information about the file, with the exception of the filename included?
A. Binode
B. Inode
C. File mode
D. Uid
Ans. B
Chap 5
46 The process of transforming plain text into unreadable text.
A. Decryption
B. Encryption
C. Network Security
D. Information Hiding
Ans. B
51 In U.S adopted a block cipher design as national standard- Data Encryption Standard.
A. 1963
B. 1973
C. 1983
D. 1993
Ans. B
53 Symmetric key cryptography uses the key for encryption and decryption.
A. Same
B. Different
C. Fixed
D. Variable
Ans. A
55 Which one of the following cipher types operates on large pieces of a message rather than
individual characters or bits of a message?
A. Stream cipher
B. Caesar cipher
C. Block cipher
D. ROT3 cipher
Ans. C
56 In which year Giovan Bellaso envisions the first cipher to use a proper encryption key?
A. 1834
B. 1553
C. 1854
D. 1556
Ans. B
57 Who invented the Play fair Cipher, which encrypts pairs of letters instead of single ones?
A. Edward Hebern
B. Poland
C. Charles Wheatstone
D. IBM
Ans. C
58 What is the name of the group that IBM have formed in 1970's to design a block cipher to
protect customer data?
A. Crypto Group
B. Stream Cipher Group
C. Block Cipher Group
D. Cipher Suites Group
Ans. A
61 What is the minimum number of keys required for secure two-way communications in
symmetric key cryptography?
A. One
B. Two
C. Three
D. Four
Ans. A
63 What is cipher?
A. both algorithm for performing encryption and decryption and encrypted message
B. encrypted message
C. decrypted message
D. algorithm for performing encryption and
decryption Ans. D
64 Which one of the following cipher types operates on large pieces of a message rather than
individual characters or bits of a message?
A. Stream cipher
B. Caesar cipher
C. Block cipher
D. ROT3 cipher
Ans. C
A. 1st only
B. 2nd and 3rd
C. 3rd only
D. 1st and
2nd Ans. D
69 DES is a .
A. Block Cipher
B. Stream Cipher
C. Bit Cipher
D. Substitution Cipher
Ans. A
Chap 7
71 Database security measures include authenticated users access to
a) data
b) Network
c) database
d) all of the
above Answer: d
72 -------- is the most secured method of centrally storing important and sensitive data
a) Relational databases
b) OLTP
c) Server-side databases
d) object level databases
Answer: a
75 ----- Command specifies that a particular user or role will have access to perform specific
action on database objects
a) REVOKE
b) GRANT
c) UPDATE
d) DENY
Answer: b
76 ------- command removes any current permission settings for the specified users or roles
a) REVOKE
b) GRANT
c) UPDATE
d) DENY
Answer: a
77 A----- is a logical relational database object that actually refers to one or more underlying
database
tables
a. REVOKE
b. VIEW
c. SELECT
d. DENY
Answer: b
78 A trigger is a
a. stored procedure in a database
b. automatically invoked if a specific action takes place within a database
c. does not automatically invoked if a specific action takes place within a database
d. both a and
b Answer: d
82 if an unauthorized database transaction was performed at 4.00 p.m. on Monday, then the
database can be restored through which backup
a) differential backups
b) full backups
c) point- in time backups
d) transactional log backups
Answer: c
83 database auditing means
a) keeping a log of data
b) data modification
c) usage of permissions
d) all of the
above Answer: d
84 when an employee record changes, corresponding changes can be easily made by calling
a) SQL commands
b) stored procedures
c) view query
d) nested query
Answer: b
85 The process of determining permission that are granted to a particular login is called as
a) authentication
b) validation
c) authorization
d) verification
Answer: c
Chap 8
86 PSTN stand for
a) Private Switched Telephone Network
b) Public Switched Telephone Network
c) Private Switched Transmission Network
d) Public Switched Transport Network
Answer: b) Public Switched Telephone Network
89 Extranet can be described as a private network that uses network to share information
with clients.
a) Private
b) Public
c) Personal
d) User
Answer: b) Public
98 In networking firewall and systems are used for controlling traffic movement around
the network.
a) authorized
b) authentication
c) autogenerated
d) automatic
Answer: b) authentication
99 ADCs stands for
a) Application Delivery Controllers
b) Application Data Composers
c) Application Device Controllers
d) Apply Delivery Controllers
Answer: a) Application Delivery Controllers
100 provides an isolated tunnel across a public network for sending and
receiving data privately as if the computing devices were directly connected to the
private network.
a) Visual Private Network
b) Virtual Protocol Network
c) Virtual Protocol Networking
d) Virtual Private Network
Answer: d) Virtual Private
Network
Chap 10
101 A firewall is installed at the point where the secure internal network and untrusted external
network meet which is also known as
Chock point
106 A firewall needs to be so that it can grow proportionally with the network that it
protects.
Expansive
107 A firewall is a security system:
Network
108 A firewall is a network security system based that controls incoming and outgoing
network traffic based on a set of rules:
Both hardware or software
110 If you have more than one computer connected in the home, it is important to protect
every computer. You should have a firewall (such as a router) to protect your network:
Hardware
111 Firewalls are often categorized as:
Either Network firewalls or Host based firewalls
118 The first reported type of network firewall is called a , which inspect packets
transferred between computers.
packet filter
119 Data travels on the internet in small pieces; these are called
packets
120 firewalls do not just look at the metadata; they also look at the actual data
transported.
Application-layer
Chap 14
121 is the term for establishing a connection with a forged sender address.
a) Sequence Guessing.
b) Spam.
c) Spoofing.
d) Session hijacking.
Ans: C
122 that identifies the users and groups who are allowed or denied access.
a) DACL.
b) SACL.
c) ACE.
d) ISP.
Ans: A
123 Bell-Lapadula model was revolutionary when it was
published in a) 1969
b) 1976
c) 1987
d) 1990
Ans: B
125 Trusted Network Interpretation of the TCSEC also known as the book.
a) Orange
b) Red
c) Yellow
d) Pink
Ans: B
127 Which if the following is not the functionality of a Discretionary access control.
a) Individual user may not determine the access control.
b) Work well in commercial and academic sector.
c) Not suited for the military
d) effective for private web site. etc
Ans: A
128 1. is a model that help is determining the protection right for example, read or
write in computers system.
a) Chinese wall
b) Take Grant
c) Clark Wilson
d) Biba
Ans: B
129 Which of the following is not the main element of an effective reference monitor?
a) Always on
b) not subject to pre-emption
c) Tamper proof
d) Heavy
weight Ans: D
130 maintain access control policy.
a) Bell-Lapadula
b) Labels
c) Reference Monitor.
d) Windows
Ans: C
131 Which of the following is not the goal of the trust worthy computing initiative?
a) Security
b) Privacy
c) Reliability
d) Authenticatio
n. Ans: D
132 defines a standard set of security requirement for a specific type of a product (e.g. OS,
database or firewall)
a) Protection profile.
b) Security Targets.
c) EAL
d) TOE
Ans: A
133 Common criteria part details the specific security functional requirements and details
a criterion for expressing the security functional requirements for target of evaluation
a) 1
b) 2
c) 3
d) 4
Ans: B
Chap 15
136 How many types of firewalls are there?
a) 1
b) 2
c) 3
d) 4
ANS: C
137 which is that software installed using an internet connection as they come by-default with
operating systems?
a) Hardware
b) Software
c) stateful Inspection firewall
d) Microsoft firewall
ANS: B
138 While entering or leaving the internal network, firewalls examine which of the following?
a) emails users
b) updates
c) connections
d) data
packets ANS: D
139 which of the below defines the packet filtering firewall rules.
a) Access Control List
b) Protocols
c) Policies
d) Ports
ANS: A
142 Which of the following is used to filter, analyse and perform heuristic behaviour detection
to help the network security administrators?
a) UDP
b) ICMP
c) SIEM
d) DNS
ANS: C
143 Q.8 Using which filtering methods, firewalls can subtract the spam from your email
messages?
a) URL filtering
b) Web content filtering
c) application filtering
d) Email spam
filtering ANS: D
144 What actually generates the traffic on servers and workstations?
a) Firewalls
b) Web content
c) Applications
d) spam
ANS: C
145 Which layer of OSI model, packet filtering firewalls are implemented?
a) Application layer
b) Session layer
c) Presentation layer
d) Network
layer ANS: D
146 Which is the following process does convert one IP address to another, and logging of traffic?
a) NAT
b) Static NAT
c) Dynamic NAT
d) PAT
ANS: A
148 Which of the following involves submitting as many requests as possible to a single internet
service, overloading it and preventing it servicing legitimate requests?
a) DOS attack
b) Masquerading
c) phishing
d) Backdoor
ANS: A
153 is a technique for reviewing the security properties of a design and identifying
potential issues and fixes.
1. Threat Modelling
2. Code Review
3. Cookies
4. SQL injection attack
Ans. Threat Modelling
154 Scripts are used for performing validations like limiting the size of the input
fields, disallow certain characters.
1. Server side
2. Client side
3. SQL query
4. Application
Ans. Client side
155 Limiting the number of connections per second per IP address and use of strong
passwords can prevent attack.
1. Brute-force
2. SQL injection
3. Buffer overflow
4. Cookies
Ans. Brute-force
159 A web interface can be accessed from any location through internet.
1. Remote
2. low
3. high
4. source
Ans. Remote
160 Customized client GUIs can be used to display that cannot be shown using
a regular web administration interface.
1. Complex graphics
2. header
3. footer
4. image
Ans. Complex graphics
162 Keeping applications up to date with the latest security is one of the most
important security measures.
1. patches
2. forms
3. OS
4. Release
Ans. Patches
165 Attacks are those that do not come under any specific category but still
they are considered as risk to website security.
1. General
2. cookies
3. forms
4. scripts
Ans. General
Chap 17
166 Switches and Firewall come under the category of assets
a) Technical equipment
b) Computer equipment
c) Communication equipment
d) Security equipment
167 Racks and NEMA-rated enclosures come under the category of assets
a) Technical equipment
b) Furniture and Fixtures
c) Communication equipment
d) Storage equipment
168 One of the following comes under the category of Technical equipment
a) Air-conditioners
b) Servers
c) Fax machine
d) Credit-cards
173 Anti-tail gating mechanism is used to prevent person from closely following
an authorized person through an open door
a) All Authorized
b) Unauthorized
c) Both Authorized and Unauthorized
d) Few Authorized
175 Forcible entry or intrusion into the premises of an organization can be prevented by using
a) Security Guards
b) CCTV Cameras
c) Infra-red sensors
d) RF devices
180 One of the following does not comes under the duty of Security Guards
a) Prevention of forcible intrusion
b) Prevention of Theft
c) Repairing of faulty CCTV
d) Prevention of Abuse and Arson
183 CSMA/CA is based on receiving a positive............... For every successfully transmitted frame
a) response
b) ACK
c) reply
d) request
Ans: ACK
187 The family of wireless LAN protocols, collectively known as Wi-Fi and commonly
found in many organizations and households
a) 802.11
b) 803
c) 801
d) 804
Ans: 802.11
189 The must be installed and designed in such a way as to encompass your
premises’ territory and minimize outside signal leakage as much as possible.
a) LAN
b) VPN
c) ETHERNET
d) WLA
N Ans: d)
WLAN
190 There are generic types of antennas, which can be further divided into subtypes
a) 3
b) 4
c) 2
d) 5
Ans: 3
191 As such, Bluetooth is very resistant to interference unless the interfering
signal covers the whole middle ISM band
a) microwave
b) radio
c) infrared
d) media
Ans: radio
192 WECA stands for
a) Wireless Ethernet Compatibility Alliance
b) Wired Ethernet Compatibility Alliance
c) Wireless Ethernet Collision Allocation
d) Wired Ethernet Collision Alliance
Ans: Wireless Ethernet Compatibility Alliance
195 There are generic types of antennas, which can be further divided into
subtypes.
a) four
b) two
c) three
d) five
Ans: c) Three
196 A radio transceiver can only transmit or receive at a given time on a given frequency, all
802.11- compliant networks are
a) full duplex
b) simplex
c) half duplex
d) complex
Ans: c) Half duplex
203 The ANSI Standard SQL language provides for the ability to use three commands for
administering permissions to tables and other database objects, the fourth wrong
command being
a) Grant
b) Revoke
c) Deny
d) Comm
it Answer: d
204 Perhaps the most commonly used method of controlling data access is
a) cursors
b) views
c) trigger
d) sequence
Answer: b
205 Instead of layers DBAs provide access to objects, some objects are given except
a) View
b) Stored procedure
c) Trigger
d) Applicati
on Answer d
206 To what granular level can security be provided
a. Application
b. Table
c. Column
d. Schema
Answer: c
210 The most important data validation feature using hidden fields is called
a. hacking
b. SQL injection
c. spoofing
d. masquerading
Answer: b
211 If you back up 13GB of data to tape media and then the database becomes corrupted, the
recovery time might be
a) two hours.
b) three hours
c) four hours
d) five hours
Answer: a
214 Which of the following is the most commonly used VoIP standard?
a) SDP
b) IMS
c) SIP
d) MGCP
answer: b
225 An attacker can gain information from voicemail or even make long-distance phone calls
using
service.
a) through-dial
b) Dial in
c) Keypad
d) None of the above
answer: a
226 PBXs store their voicemail data on a
a) hard drive
b) external storage
c) internal storage
d) All of the above
answer: a
1. The security program must include the right level of responsibility and
authorization to be effective.
a) Authority
b) Framework
c) Planning
d) Gap Analysis
Answer: Authority
2. for the use of software, computer systems, and networks should be clearly
documented for the sake of the people who use these technologies
a) Rules
b) Guidelines
c) Program
d) Network
Answer: Guidelines
5. is an important asset.
a) Information
b) Algorithm
c) Program
d) Science
Answer : Information
.
7. Which is not a Fundamental storage infrastructure?
a) Storage networks
b) Arrays
c) Servers
d) Vectors
Answer : Vectors
8. The alternative to port zoning, in which the zones are created relative to the ports the servers
are connected to on the switch, is
a) Arrays
b) Server
c) WNN zoning
d) Administration channel
Answer: WNN zoning
11. Computer and storage failures that corrupt data , damage the integrity of that data is called
a) Data deletion
b) Data loss
c) Data corruption
d) Malfunctions
Answer: Malfunctions
13. are 48-bit hexadecimal numbers that are uniquely assigned to each
hardware network interface by the manufacturer.
a) MAC addresses
b) IP addresses
c) Application Specific addresses
d) Port Addresses
Answer. MAC addresses
14. are 32-bit numbers assigned by the network administrator that allow for the
creation of logical and ordered addressing on a local network.
a) Port Addresses
b) MAC addresses
c) IPv4 addresses
d) IPv6 addresses
Answer. 7
16. HTTP works on which of the following layer of the TCP/IP Protocol suite?
a) Network
b) Application
c) Transport
d) Datalink
Answer. Application
17. layer is used to define and control electrical signals over the physical media.
a) Physical
b) Network
c) Application
d) Transport
Answer. Physical
18. are dumb devices which are used for connecting two or more devices.
a) Switch
b) Gateway
c) Router
d) Hub
Answer. Hub
19. An attacker can trick a local network segment into sending it another device’s traffic with an
attack known as .
a) DNS poisoning
b) Eaves dropping
c) Social Engineering
d) ARP poisoning
Answer: Buildings
1. The ____________security program must include the right level of responsibility and authorization to be effective.
a. Authority
b. Framework
c. Planning
d. Gap Analysis
Answer: a
2. ________________for the use of software, computer systems, and networks should be clearly
documented for the sake of the people who use these technologies
a. Rules
b. Guidelines
c. Program
d. Network
Answer: b
3. A _________________ is a plan of action for how to implement the security remediation plans.
a. Planning
b. Road
c. Roadmap
d. Gap Analysis
Answer: c
4. ______________is concerned with protecting information in all its forms, whether written, spoken,
electronic, graphical, or using other methods of communication.
a. Information security
b. Network Security
c. Computer Security
d. Graphics Security
Answer: a
a. Information
b. Algorithm
c. Program
d. All of the Above
Answer :a
6. FUD stands for ___________
a. fear,understanding,defense
b. fear, uncertainty, and doubt
c. fact,uncertainity,defense
d. None of the Above
Answer: b
7. The field of __________ is concerned with protecting assets in general
a. Network
b. Information
c. Security
d. Program
Answer: c
8. The basic assumptions of security are as follows
a. We want to protect our assets.
b. There are threats to our assets.
c. We want to mitigate those threats.
d. All of the above
Answer: d
9. __________Assessing what needs to be protected, why, and how leads to a strategy for improving the
security posture.
a. Assessment
b. Planning
c. Frame Work
d. Roadmap
Answer: a
10. A universal truth of security, regardless of the application, is that the job of the attacker is always
___________ than the job of the defender.
a. Difficult
b. Easy
c. Moderate
d. None of the Above
Answer: b
11. The three Ds of security are _____________
a. delete,desired,defect
b. defense, detection, and deterrence
c. Defect,Deterrent,Dial
d. None of the Above
Answer: b
12. A ______________ compares the desired state of the security program with the actual current state and
identifies the differences.
a. risk analysis
b. Remediation planning
c. gap analysis
d. Planning
Answer: c
13. ___________are used to educate employees, business partners, and other stakeholders about what
behaviours are expected of them, what actions they should take under various circumstances to comply
with security policies
7. A ________ is a plan of action for how to implement the security remediation plans.
a. Incident plan
b. Response plan
c. Roadmap
d. Risk plan
8. The actions that should be taken when security event occurs are defined in the_________
a. Project Plan
b. Remedy Plan
c. Incident response plan
d. Policy plan
9. “The job of the attacker is difficult than the job of the defender”
a. False
b. True
10. What is transitive Security?
a. All security controls need not complement each other and each should be equally as strong as the
others
b. All security controls need not complement each other and should be unequal
c. All security controls should complement each other and each should be equally as strong as the
others
d. All security controls should complement each other and should be unequal
11. PBX stands for _________
a. Public Branch Exchange
b. Private Branch Exchange
c. Public Branch Environment
d. Private Branch Environment
12. What is difference between strategy and tactic?
a. Strategy are done in small time frame whereas tactic is small time goal
b. Strategy are smaller steps whereas tactic are large concrete steps
c. Strategy are small-term goals whereas tactic are large concrete steps
d. Strategy are long-term goals whereas tactic are small concrete steps
13. Content attacks, Buffer overflows and Password cracking are attacks of which layer?
a. Transport
b. Physical
c. Application
d. Network
14. _______ occurs when an unauthorized third party captures network packets destined for
computers other than their own.
a. Tracking
b. SQL Injection
c. Sniffing
d. Traffic replay
15. NIC stands for ___________
a. Network Interface Card
b. Network Intermediate Card
c. Network Interface Configuration
d. Network Intermediate Configuration
16. _____ refers to the restriction of access to data only to those who are authorized to use it
a. Integrity
b. Confidentiality
c. Availability
d. Privacy
17. Perimeter model is like ___________
a. Onion
b. layer
c. lollipop
d. sponge
18. What is the threat from “Windows Shell Command File”?
a. It can execute malicious code
b. It can contain malicious code
c. It can install malicious code
d. It can change security settings
19. A self-replicating program that uses other host file or code to replicate is called _____
a. Worms
b. Virus
c. Trojan
d. Ransomware
20. How can we defend network from ARP poisoning?
a. Firewall
b. Use Encryption
c. Secure P2P Services
d. Configure Port Rate Limiting
Unit II
21. One-time password, Biometrics are types of ____________
a. Authorization
b. Authentication
c. Encryption
d. None of the above
22. ____________ authentication requires user to authenticate with more than one authentication
factor
a. Mobile Authentication
b. Continuous Authentication
c. Multifactor Authentication
d. Three-Factor Authentication
23. Which of the following is incorrect about OAuth Authentication?
a. It is an open standard for token-based authentication and authorization on internet
b. It allows user’s account information to be used by third party services without exposing user’s
password
c. OAuth acts as an intermediary on behalf of user
d. OAuth stands for Onion-route Authorization
24. Which of the following is not a synonym of crypt?
a. light
b. vault
c. chamber
d. hidden
25. Confidentiality, Integrity, Non-repudiation and Authentication are objectives of ______
a. Risk Management
b. Cryptography
c. Authorization
d. Administration
26. From below which of the following is not a property of “Public key encryption Scheme”-
i. Different keys are used for encryption and decryption
ii. Receiver needs to publish an encryption key referred to as his private key
iii. Each sender possesses a unique decryption key generally known as public key
a. i. and ii.
b. i. and iii.
c. ii. only
d. ii. and iii.
27. NAS can be accessed by most of the computers and other devices on the network, while SAN is
typically used by servers.
a. False
b. True
28. ___________ is an attempt to trick the victim into disclosing personal information
a. Hijacking
b. Theft
c. Phishing
d. Packet sniffing
29. The HTTP cookies used to maintain a session on a website is stolen by attacker and now attacker is
using it to gain access to privileged information posing as a genuine user.
What type of attack is this?
a. Hijacking
b. Theft
c. Phishing
d. Packet sniffing
30. A _____ type of attack is an attempt to make a computer resource unavailable to its intended users.
a. Application failure
b. Outage
c. Denial of Service
d. Backup failure
31. _____ is any unexpected downtime or unreachability of a computer system or network
a. Application failure
b. Outage
c. Denial of Service
d. Backup failure
32. __________improves security through control of the connections between hosts and storage array
a. Server
b. Offsite Data Storage
c. Arrays
d. Post-based Zoning
Unit III
41. Network analysis, architecture and design are processes used to produce designs that are _____
a. logical
b. reproducible
c. available
d. attacking
42. Following statements are right about Acceptable risks
a. It is management’s responsibility to set their company’s level of risk
b. It is security professional’s responsibility to set their company’s level of risk
c. Acceptable risk is derived from legal and regulatory compliance responsibilities etc.
d. Not all companies have acceptable risk
43. ___________ and ___________ systems are used to control traffic of the network
a. Authentication
b. Authorization
c. Firewall
d. Network Traffic control
44. _________ is a network not available to outside world, only those who are granted can access
network for sharing and viewing purpose
a. Extranet
b. Intranet
c. Internet
d. PBX
45. In DMZ configuration the____ layer consists web server that interacts with end users whereas the
_____ layer contains logic necessary for processing those queries and extracting the data that is
stored in DB.
a. Presentation, session
b. Session, presentation
c. Application, presentation
d. Presentation, application
63. ______ is a device or software application that monitors a network or system for malicious activity
or policy violation.
a. Host-based Intrusion Detection System
b. Intrusion Prevention System
c. Security Information and Event Management
d. Intrusion Detection System
64. IDS and ______ are important tools in a computer security arsenal.
a. Network-based Intrusion Detection System
b. Host-based Intrusion Detection System
c. Intrusion Prevention System
d. Security Information and Event Management
65. PSTN stands for _________
a. Private Switch Telecom Network
b. Public Switched Telephone Network
c. Public Service Telephone Network
d. Private System Telecom Network
66. VoIP stands for __________
a. Voice on Internet Protocol
b. Voice of Internal Protocol
c. Voice on Inter Protocol
d. Voice over Internet Protocol
67. TDM stands for _____
a. Time Division Multiplexing
b. Time Divide Management
c. Time Division Management
d. Time Depend Message
68. ACL stands for ______
a. Access Control List
b. Application Control List
c. Application Complex List
d. Access Control Least
69. MCU stands for _________.
a. Multi-Call Unit
b. Multi-Conference Unit
c. Multiple Choice Unit
d. Multiple Cell Unit
70. TEM stands for ________
a. Telecom Expense Management
b. Time Exchange Management
c. Telecommunication Export Management
d. Time Export Management
71. MAC stands for __________
a. Main Access Control
b. Mandatory Access Control
c. Management Access Control
d. Mandatory Appeal Contact
72. DACL stands for _________
a. Discretionary Access Control List
b. Discrete Access Complex List
c. Direct Access Complex List
d. Discrete Access Control List
73. RABC stands for ________
a. Right Bound Access Control
b. Rule Bind Access Control
c. Rule-Based Access Control
d. Role Based Access Control
74. TCSEC stands for ________
a. Trusted Computer System Evolution Criteria
b. Time Complex System Evaluation Criteria
c. Time Correction System Evolution Criteria
d. Trusted Computer System Evaluation Criteria
75. PP stands for ______
a. Protection Profile
b. Probability Protection
c. Protection protocol
d. Private Profile
76. ST stands for _______
a. Security Time
b. Service Time
c. Security Target
d. Security Tax
77. HIDS stands for _____
a. House-based Intrusion Detection System
b. Host-based Information Detection System
c. House-based Information Detection System
d. Host-based Intrusion Detection System
78. ______ is often known as a reversed version of Bell-LaPadula
a. Biba
b. TCSEC
c. Clark-Wilson
d. Security Target
79. ______ is computer-based switch that can be thought of as a local phone company
a. Denial of Service
b. Private Branch Exchange
c. Voicemail
d. Telecom Expense Management
80. _______ can be network-based or host-based
a. Intrusion Prevention System
b. Intrusion Detection System
c. Private Branch Exchange
d. Protection Profile
Unit V
81. A virtual machine is a ____________
a. Computer application
b. Computer file
c. Computer image
d. Physical computer
82. __________ is typically called an image
a. Virtual machine
b. Virtual hardware
c. Computer memory
d. Computer resources
83. Virtual machine includes _________________
a. Beta releases
b. Accessing virus-infected data
c. Creating OS backup
d. All of the above
84. Virtual machine can be run simultaneously on the same _____________
a. Physical computer
b. Operating system
c. Hardware system
d. Cloud computing
85. For a server, the multiple OS run side-by-side with a piece of software called as____________
a. Supervisor
b. Biometric
c. Hypervisor
d. Thread
2. ________________for the use of software, computer systems, and networks should be clearly
documented for the sake of the people who use these technologies
a) Rules
b) Guidelines
c) Program
d) Network
Answer: b
3. A _________________ is a plan of action for how to implement the security remediation plans.
a) Planning
b) Road
c) Roadmap
d) Gap Analysis
Answer: c
4. ______________is concerned with protecting information in all its forms, whether written, spoken,
electronic, graphical, or using other methods of communication.
a) Information security
b) Network Security
c) Computer Security
d) Graphics Security
Answer: a
a) Information
b) Algorithm
c) Program
d) Science
Answer :a
7. What is Authentication ?
a) Encryption
b) Proof of Identity
c) Access
d) Modification
Ans . b
8. Which of the following is the least secure method of authentication ?
a) Fingerprint
b) Retina Pattern
c) Smart Card
d) Password
Ans. d
9. Which of the following is a strong password ?
a. 22September99
b. !996543
c. India@4521
d. Mona57567
Ans. c
12. Which of the methods below uses a hash algorithm for authentication?
a) Sequential keys
b) Local storage
c) Certificate based authentication
d) Secure socket layer
Ans. a
13. What does CIA stand for
a) Confidentiality, Integrity, Availability
b) Central Intelligence Agency
c) Cyber security ,Investigation Agency
d) Cyber security, Internet, Accessibility
Answer : a
14. _________ means protecting the data from getting disclosed to those who are not authorized to use
it.
a) Integrity
b) Authorization
c) Confidentiality
d) Availability
Answer: c
15. The protection of data from modification by unknown users is known as _____________
a) Confidentiality
b) Integrity
c) Authentication
d) Data theft
Answer: b
16. _____________ means that the sender must not be able to deny sending a message that he / she has
sent.
a) Authentication
b) Integrity
c) Confidentiality
d) Non-repudiation
Answer: d
17. Which direction access cannot happen using the DMZ zone by default?
a) Company computer to DMZ
b) Internet to DMZ
c) Internet to company computer
d) Company computer to Internet
Answer: c
23. Computer and storage failures that corrupt data , damage the integrity of that data is called
a) Data deletion
b) Data loss
c) Data corruption
d) Malfunctions
Answer: d
24. The most common cause of data integrity loss is
a) Accidental modification
b) Data corruption
c) Data deletion
d) Malfunctions
Answer: a
38. ______________ are 48-bit hexadecimal numbers that are uniquely assigned to each hardware network
interface by the manufacturer.
a) MAC addresses
b) IP addresses
c) Application Specific addresses
d) Port Addresses
Answer. a
39. ___________ are 32-bit numbers assigned by the network administrator that allow for the creation of
logical and ordered addressing on a local network.
a) Port Addresses
b) MAC addresses
c) IPv4 addresses
d) IPv6 addresses
Answer. c
41. HTTP works on which of the following layer of the TCP/IP Protocol suite?
a) Network
b) Application
c) Transport
d) Datalink
Answer. b
42.____________ layer is used to define and control electrical signals over the physical media.
a) Physical
b) Network
c) Application
d) Transport
Answer. a
43. ________ are dumb devices which are used for connecting two or more devices.
a) Switch
b) Gateway
c) Router
d) Hub
Answer. d
44. An attacker can trick a local network segment into sending it another device’s traffic with an attack known as
_____________.
a) DNS poisoning
b) Eaves dropping
c) Social Engineering
d) ARP poisoning
Answer. D
46. Microsoft SQL Server database platform uses a default TCP port of
a) 1527
b) 1433
c) 3306
d) 2231
Answer: b
51. Instead of layers DBAs provide access to objects, some objects are given except
a) view
b) Stored procedure
c) trigger
d) application
Answer d
ANS: c
56. which is that software installed using an internet connection as they come by-default with operating systems?
a) Hardware
b) Software
c) stateful Inspection firewall
d) Microsoft firewall
ANS:b
57. While entering or leaving the internal network,firewalls examine which of the following?
a) emails users
b) updates
c) connections
d) data packets
ANS:d
58. which of the below defines the packet filtering firewall rules
a) .Access Control List
b) Protocols
c) Policies
d) Ports
ANS:a
59. Which port number is used to effectively manage the firewall?
a) 70
b) 71
c) 80
d) 72
ANS:c
60. Which address results in same address translation?
a) NAT
b) Static NAT
c) Dynamic NAT
d) PAT
ANS:b
61. Which of the following is used to filter, analyse and perform heuristic behavior detection to help the network
security administrators?
a) UDP
b) ICMP
c) SIEM
d) DNS
ANS:c
62. Using which filtering methods, firewalls can subtract the spam from your email messages?
a) URL filtering
b) Web content filtering
c) capplication filtering
d) Email spam filtering
ANS:d
ANS: c
64. Which layer of OSI model, packet filtering firewalls are implemented?
a) Application layer
b) Session layer
c) Presentation layer
d) Network layer
ANS:d
65. which is the following process does converting one IP address to another, and logging of traffic?
a) NAT
b) Static NAT
c) Dynamic NAT
d) PAT
ANS: a
69.__________ is a technique for reviewing the security properties of a design and identifying potential issues
and fixes.
a) Threat Modeling
b) Code Review
c) Cookies
d) SQL injection attack
Ans. a
70. ___________ Scripts are used for performing validations like limiting the size of the input fields, disallow
certain characters.
a) Server side
b) Client side
c) SQL query
d) Application
Ans. b
71. Limiting the number of connections per second per IP address and use of strong passwords can prevent
___________ attack.
a) Brute-force
b) SQL injection
c) Buffer overflow
d) Cookies
Ans. a
72. Application security is mainly controlled by the ____________ of the application, as he/she requires extensive
knowledge about various areas like GUI, network connectivity, OS interaction and sensitive data management for
writing secure programs.
a) Server
b) Developer
c) Client
d) Company
Ans. b
73.___________ is common method of verifying that the person on the other end is a human being by showing a
distorted image of letters and numbers and requiring the user to type them in correctly.
a) OTP
b) password
c) CAPTCHA
d) graphics
Ans. c
74. Web interface has _________ quick development time than GUI.
a) slow
b) fast
c) medium
d) regular
Ans. b
75. A web interface can be accessed from any ________ location through internet.
a) Remote
b) low
c) high
d) source
Ans. a
76. Customized client GUIs can be used to display ________________ that cannot be shown using a regular web
administration interface.
a) Complex graphics
b) header
c) footer
d) image
Ans. a
80. One of the following comes under the category of Technical equipment
a) Air-conditioners
b) Servers
c) Fax machine
d) Credit-cards
Answer: a
Answer: c
84. _______________ is an area designed to allow only one authorized person to enter in
a) Mantrap
b) Human trap
c) One pass
d) Secure Pass
Answer: a
85. Antitailgating mechanism is used to prevent _________________ person from closely following an authorized person
through an open door
a) All Authorized
b) Unauthorized
c) Both Authorized and Unauthorized
d) Few Authorized
Answer: b
86. ______________ is used to confirm the identification of an individual through fingerprint, voice, face, retina, iris etc
a) Passwords
b) Signature verification
c) PCMC Card
d) Biometric device
Answer: d
87. Forcible entry or intrusion into the premises of an organization can be prevented by using
a) Security Guards
b) CCTV Cameras
c) Infra-red sensors
d) RF devices
Answer: a
answer: a
92. VOIP networks use primarily what kind of switching technology
a) Protocol switching
b) Packet switching
c) Constantly switching
d) Cellular switching
answer: b
93. In a VOIP network, it is possible to use which devices to make a call
a) An IP phone
b) A traditional phone (with a gateway)
c) A computer with VOIP software
d) Voice Over International Premises
answer: a
94. SRTP stands for_______________
a) Secure Real-Time Transfer Protocol
b) Secure Real-Time Transmission Protocol
c) Secure Real-Time Transport Protocol
d) Secure Real-Time traffic Protocol
answer: c
95. PBX stands for________
a) public Branch Exchange
b) Public Branch Element
c) Private Branch Element
d) Private Branch Exchange
answer: d
96. _____________provide intelligence and control certain routing and authentication, authorization, and
accounting (AAA) security functions.
a) Gatekeepers
b) Bridge
c) PBX
d) TEM
answer: a
97. The most important data validation feature using hidden fields is called
a) hacking
b) SQL injection
c) spoofing
d) masquerading
Answer :b
98. If you back up 13GB of data to tape media and then the database becomes corrupted, the recovery time might
be
a) two hours.
b) three hours
c) four hours
d) five hours
Answer: a
1.To send a packet, the source should know the following addresses
a. MAC Address
b. IP address
c. DNS
d. Both IP address and MAC Address
Answer : d
3. The protocol used to find the IP address when Mac address is given
a. RARP
b.ARP
c. DNS
d. IP
Answer :b
5. The connection less protocol used in transport layer in OSI reference model is
a. TCP
b. UDP
c. IP
d. RARP
Answer: b
10. _________ are the updates released by the product vendor which should be applied in a timely manner
a. Patches
b. Updates
c. Instants
d. Data
Answer : a
11 The ______can be queried to see who logged on to the router from where
a. TFTP Server
b. Web server
c. Diagnostic Services
d. Finger Services
Answer :D
15. ___________-is used to trouble shoot the network layer connectivity by mapping the network path between
the source and destination
a. Traceroute
b. Echo
c. SNMP
d. ICMP
Answer :a
17. ___________ is an attempt to slip through the external defenses by masquerading as an internal host.
a. Sniffing
b. Address spoofing
c. Trojan horse
d. Worms
Answer: B
18. The fragmentation needed is which code of the ICMP error message
a. 1
b. 2
c. 3
d. 4
Answer :D