Security in Computing Solved MCQs

1.

Which of the following is not a benefit of Security Program?

A. business agility
B. cost reduction
C. portability
D. frees ram
Answer» D. frees ram
2.

PXB stands for _____________

A. public branch exchange
B. private branch exchange
C. public branch environment
D. private branch environment
Answer» A. public branch exchange
3.

which of the following is not a synonym of crypt?

A. light
B. vault
C. chamber
D. hidden
Answer» A. light
4.

Which of the following is incorrect about OAuth Authentication?

A. it is an open standard for token-based authentication and authorization on internet
B. it allows user\s account information to be used by third party sevices without exposing user\s password
C. oauth acts as an intermediary on behalf of user
D. oauth stands for onion-route authorization
Answer» D. oauth stands for onion-route authorization
5.

IDS and _______ are important tools in a computer security arsenal.

A. network-based intrusion detection system
B. host-based intrusion detection system
C. intrusion prevension system
D. security information and event management
Answer» C. intrusion prevension system
6.

____________ is often known as a reversed version of Bell-LaPadula

A. biba
B. tcsec
C. clark-wilson
D. security target
Answer» A. biba
7.

Virtual machine can be divided into_______________

A. super vm, system vm
B. super vm, cloud computing
C. system vm, process vm
D. cloud computing, system vm
Answer» C. system vm, process vm
8.

Thick client application is classified into ________ type

A. 1
B. 2
C. 3
D. 4
Answer» B. 2
Tags
Question and answers in Security in Computing, Security in Computing multiple choice questions and answers, Security in Computing Important MCQs, Solved MCQs for Security in Computing, Security in Computing MCQs with answers PDF download