Information and Network Security Solved MCQs


An algorithm in encryption is called _____________.

A. Algorithm
B. Procedure
C. Cipher
D. Module
Answer» C. Cipher

The information that gets transformed in encryption is ____________.

A. Plain text
B. Parallel text
C. Encrypted text
D. Decrypted text
Answer» A. Plain text

In brute force attack, on average half of all possible keys must be tried to achieve success.

A. True
B. False
C. none
D. all
Answer» A. True

A (n) ______ algorithm transforms ciphertext to plaintext.

A. Encryption
B. Decryption
C. Either (a) or (b)
D. Neither (a) nor (b)
Answer» B. Decryption

The ________ is the message after transformation.

A. Ciphertext
B. Plaintext
C. Secret-text
D. None of the above
Answer» A. Ciphertext

Which of the following is not a type of virus?

A. Boot sector
B. Polymorphi
C. C Multipartite
D. Troj
Answer» A. Boot sector

A computer ________ is a malicious code which self-replicates by copying itself to other programs.

A. Program
B. Virus
C. Application
D. Worm
Answer» B. Virus

_______________ infects the master boot record and it is challenging and a complex task to remove this virus.

A. Boot Sector Virus
B. Polymorphi
C. C Multipartite
D. Troj
Answer» A. Boot Sector Virus

______________ infects the executable as well as the boot sectors.

A. Non-resident virus
B. Boot Sector Virus
C. Polymorphic Virus
D. Multipartite Virus
Answer» D. Multipartite Virus

Trojan creators do not look for _______________.

A. Deleting Data
B. Protecting Data
C. Modifying Data
D. Copying Data
Answer» B. Protecting Data

Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system.

A. Virus, Cyber-Criminals
B. Malware, Penetration Testers
C. Trojans, Cyber-Criminals
D. Virus, Penetration Testers
Answer» C. Trojans, Cyber-Criminals

During a DOS attack, the regular traffic on the target _____________ will be either dawdling down or entirely interrupted.

A. Network
B. System
C. Website
D. Router
Answer» C. Website

The intent of a __________ is to overkill the targeted server’s bandwidth and other resources of the target website.

A. Phishing attack
B. DoS attack
C. Website attack
D. MiTM attack
Answer» B. DoS attack

In ________ some cyber-criminals redirect the legitimate users to different phishing sites and web pages via emails, IMs, ads and spyware.

A. URL Redirection
C. Phishing
D. MiTM attack
Answer» C. Phishing

Trojan creators do not look for _______________.

A. Credit card information
B. Confidential data
C. Important documents
D. Securing systems with such programs
Answer» D. Securing systems with such programs

1. When one participant in a communication pretends to be someone else, it is called _________?

A. Virus Attacks
B. Fire Attacks
C. Data Driven Attacks
D. Masquerade
Answer» D. Masquerade

________ is a term used to describe a phishing attack that is specifically aimed at wealthy, powerful, or prominent individuals. Generally CEO’s and important celebrities.

A. Message Authentication Code
B. Steganography
C. Whale phishing
D. A cipher
Answer» C. Whale phishing

Compromising confidential information comes under _________.

A. Bug
B. Threat
C. Vulnerability
D. Attack
Answer» B. Threat

When an attacker sends unsolicited communication, it is an example of_____.

A. Spoofing
B. Spamming
C. Crackers
D. Sniffers
Answer» A. Spoofing

Masquerading is _______.

A. Attempting to hack a system through backdoors to an operating system or application.
B. Pretending to be an authorized user
C. Always done through IP spoofing
D. Applying a subnet mask to an internal IP range
Answer» B. Pretending to be an authorized user

Integrity is protection of data from all of the following except ________.

A. Unauthorized changes
B. Accidental changes
C. Data analysis
D. Intentional manipulation
Answer» C. Data analysis

A security program cannot address which of the following business goals?

A. Accuracy of information
B. Change control
C. User expectations
D. Prevention of fraud
Answer» A. Accuracy of information

The absence of a fire-suppression system would be best characterized as_______.

A. Exposure
B. Threat
C. Vulnerability
D. Risk
Answer» C. Vulnerability

Asymmetric key cryptography is used for all of the following except_______.

A. Encryption of data
B. Access control
C. Nonrepudiation
D. Steganography
Answer» D. Steganography

Firewalls are to protect against________.

A. Virus Attacks
B. Fire Attacks
C. Data Driven Attacks
D. Unauthorized Attacks
Answer» D. Unauthorized Attacks
Question and answers in Information and Network Security, Information and Network Security multiple choice questions and answers, Information and Network Security Important MCQs, Solved MCQs for Information and Network Security, Information and Network Security MCQs with answers PDF download

We need your help!

We're developing a website for study materials for students.
We would love to hear your answers to some of the questions.

Take Survey