McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Bachelor of Computer Applications (BCA) .
1. |
This technology is used to measure and analyze human body characteristics for authentication purposes. |
A. | Footprinting |
B. | Biometrics |
C. | JBOD |
D. | Anthropomorphism |
Answer» B. Biometrics |
2. |
__________ is an electronic or paper log used to track computer activity. |
A. | Traceroute |
B. | Cookie |
C. | Weblog |
D. | Audit trail |
Answer» D. Audit trail |
3. |
This is a series of messages sent by someone attempting to break into a computer to learn which computer network services the computer provides. |
A. | Bit robbing |
B. | Web services description language (WSDL) |
C. | Jabber |
D. | Port scan |
Answer» D. Port scan |
4. |
This is the name for a group of programmers who are hired to expose errors or security holes in new software or to find out why a computer network's security is being broken. |
A. | ERM group |
B. | Computer emergency response tea |
C. | Tiger team |
D. | Silicone cockroach |
Answer» C. Tiger team |
5. |
This is a mechanism for ensuring that only authorized users can copy or use specific software applications. |
A. | Authorized program analysis report |
B. | Private key |
C. | Service level agreement |
D. | Dongle |
Answer» D. Dongle |
6. |
At which two traffic layers do most commercial IDSes generate signatures? |
A. | Application layer |
B. | Network layer |
C. | Session layer |
D. | Transport layer |
Answer» B. Network layer |
7. |
This is a Peripheral Component Interconnect (PCI) card that offloads SSL processing to speed up secure transactions on e-commerce Web sites. |
A. | PCMCIA card |
B. | Smart card |
C. | Server accelerator card |
D. | Network interface card |
Answer» C. Server accelerator card |
8. |
___________is a form of eavesdropping used to pick up telecommunication signals by monitoring the electromagnetic fields produced by the signals. |
A. | Reverse engineering |
B. | Magneto resistive head technology |
C. | Van Eck phreaking |
D. | Electronic data processing (EDP) |
Answer» C. Van Eck phreaking |
9. |
This enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. |
A. | Security Identifier (SID) |
B. | Public key infrastructure (PKI) |
C. | Internet Assigned Numbers Authority (IANA) |
D. | Private Branch Exchange (PBX) |
Answer» B. Public key infrastructure (PKI) |
10. |
This is an assault on the integrity of a security system in which the attacker substitutes a section of cipher text (encrypted text) with a different section that looks like (but is not the same as) the one removed. |
A. | Trojan horse |
B. | Hashing |
C. | Switching fabric |
D. | Cut and paste attack |
Answer» D. Cut and paste attack |
11. |
Which of the following is an advantage of anomaly detection? |
A. | Rules are easy to define. |
B. | Custom protocols can be easily analyzed. |
C. | The engine can scale as the rule set grows. |
D. | Malicious activity that falls within normal usage patterns is detected. |
Answer» C. The engine can scale as the rule set grows. |
12. |
A false positive can be defined as… |
A. | An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior. |
B. | An alert that indicates nefarious activity on a system that is not running on the network. |
C. | The lack of an alert for nefarious activity. |
D. | Both a. and b. |
Answer» D. Both a. and b. |
13. |
This is an encryption/decryption key known only to the party or parties that exchange secret messages. |
A. | E-signature |
B. | Digital certificate |
C. | Private key |
D. | Security token |
Answer» C. Private key |
14. |
What is the purpose of a shadow honeypot? |
A. | To flag attacks against known vulnerabilities |
B. | To help reduce false positives in a signature-based IDS. |
C. | To randomly check suspicious traffic identified by an anomaly detection system. |
D. | To enhance the accuracy of a traditional honeypot. |
Answer» C. To randomly check suspicious traffic identified by an anomaly detection system. |
15. |
This is is the hiding of a secret message within an ordinary message and the extraction of it at its destination. |
A. | Secret key algorithm |
B. | Message queuing |
C. | Spyware |
D. | Steganography |
Answer» D. Steganography |
16. |
An IDS follows a two-step process consisting of a passive component and an active component. Which of the following is part of the active component? |
A. | Inspection of password files to detect inadvisable passwords |
B. | Mechanisms put in place to reenact known methods of attack and record system responses |
C. | Inspection of system to detect policy violations |
D. | Inspection of configuration files to detect inadvisable settings |
Answer» B. Mechanisms put in place to reenact known methods of attack and record system responses |
17. |
When discussing IDS/IPS, what is a signature? |
A. | An electronic signature used to authenticate the identity of a user on the network |
B. | Attack-definition file |
C. | It refers to "normal," baseline network behavior |
D. | None of the above |
Answer» B. Attack-definition file |
18. |
"Semantics-aware" signatures automatically generated by Nemean are based on traffic at which two layers? |
A. | Application layer |
B. | Network layer |
C. | Session layer |
D. | Both a and c |
Answer» D. Both a and c |
19. |
In what type of attack does an intruder manipulate a URL in such a way that the Web server executes or reveals the contents of a file anywhere on the server, including those lying outside the document root directory? |
A. | Cross-site scripting |
B. | Command injection |
C. | SQL injection |
D. | Path traversal attacks |
Answer» D. Path traversal attacks |
20. |
Which of the following is true of improper error handling? |
A. | Attackers can use error messages to extract specific information from a system. |
B. | Attackers can use unexpected errors to knock an application off line, creating a denial-of- service attack. |
C. | Unexpected errors can provide an attacker with a buffer or stack overflow condition that sets the stage for an arbitrary code execution. |
D. | All of the above. |
Answer» D. All of the above. |
21. |
Which of the following is NOT recommended for securing Web applications against authenticated users? |
A. | Client-side data validation |
B. | Filtering data with a default deny regular expression |
C. | Running the application under least privileges necessary |
D. | Using parameterized queries to access a database |
Answer» A. Client-side data validation |
22. |
In which of the following exploits does an attacker insert malicious coding into a link that appears to be from a trustworthy source? |
A. | Cross-site scripting |
B. | Command injection |
C. | Path traversal attack |
D. | Buffer overflow |
Answer» A. Cross-site scripting |
23. |
In which of the following exploits does an attacker add SQL code to a Web form input box to gain access to resources or make changes to data? |
A. | Cross-site scripting |
B. | Command injection |
C. | SQL injection |
D. | Buffer overflow |
Answer» C. SQL injection |
24. |
Which of the following is characteristic of spyware? |
A. | Blocking access to antivirus and antispyware updates |
B. | Aggregating surfing habits across multiple users for advertising |
C. | Customizing search results based on an advertiser's needs |
D. | All of the above |
Answer» B. Aggregating surfing habits across multiple users for advertising |
25. |
One of the most obvious places to put an IDS sensor is near the firewall. Where exactly in relation to the firewall is the most productive placement? |
A. | Inside the firewall |
B. | Outside the firewall |
C. | Both |
D. | None |
Answer» A. Inside the firewall |
26. |
This was commonly used in cryptography during World War II. |
A. | Tunneling |
B. | Personalization |
C. | Van Eck phreaking |
D. | One-time pad |
Answer» D. One-time pad |
27. |
Today, many Internet businesses and users take advantage of cryptography based on this approach. |
A. | Public key infrastructure |
B. | Output feedback |
C. | Encrypting File System |
D. | Single sign on |
Answer» A. Public key infrastructure |
28. |
This is the name for the issuer of a PKI certificate. |
A. | Man in the middle |
B. | Certificate authority |
C. | Resource Access Control Facility |
D. | Script kiddy |
Answer» B. Certificate authority |
29. |
Developed by Philip R. Zimmermann, this is the most widely used privacy-ensuring program by individuals and is also used by many corporations. |
A. | DS |
B. | OCSP |
C. | Secure HTTP |
D. | Pretty Good Privacy |
Answer» D. Pretty Good Privacy |
30. |
This is the encryption algorithm that will begin to supplant the Data Encryption Standard (DES) - and later Triple DES - over the next few years as the new standard encryption algorithm. |
A. | Rijndael |
B. | Kerberos |
C. | Blowfish |
D. | IPsec |
Answer» A. Rijndael |
31. |
This is the inclusion of a secret message in otherwise unencrypted text or images. |
A. | Masquerade |
B. | Steganography |
C. | Spoof |
D. | Eye-in-hand system |
Answer» B. Steganography |
32. |
In password protection, this is a random string of data used to modify a password hash. |
A. | Sheepdip |
B. | Salt |
C. | Bypass |
D. | Dongle |
Answer» B. Salt |
33. |
This is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding cipher text value and vice versa. |
A. | Foot printing |
B. | Hash function |
C. | Watermark |
D. | Electronic Code Book |
Answer» D. Electronic Code Book |
34. |
This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies. |
A. | Chaffing and winnowing |
B. | Cryptanalysis |
C. | Serendipity |
D. | Brute force cracking |
Answer» D. Brute force cracking |
35. |
An intruder might install this on a networked computer to collect user ids and passwords from other machines on the network. |
A. | Passphrase |
B. | Root kit |
C. | Ownership tag |
D. | Token |
Answer» B. Root kit |
36. |
This type of intrusion relies on the intruder's ability to trick people into breaking normal security procedures. |
A. | Shoulder surfing |
B. | Hijacking |
C. | Brain fingerprinting |
D. | Social engineering |
Answer» D. Social engineering |
37. |
The developers of an operating system or vendor application might issue this to prevent intruders from taking advantage of a weakness in their programming. |
A. | Cookie |
B. | Key fob |
C. | Watermark |
D. | Patch |
Answer» D. Patch |
38. |
This is an attack on a computer system that takes advantage of a particular vulnerability that the system offers to intruders. |
A. | Port scan |
B. | Denial of service |
C. | Exploit |
D. | Logic bomb |
Answer» C. Exploit |
39. |
This is a program in which harmful code is contained inside apparently harmless programming or data. |
A. | Snort |
B. | Honeypot |
C. | Blue bomb |
D. | Trojan horse |
Answer» D. Trojan horse |
40. |
This is the modification of personal information on a Web user's computer to gain unauthorized information with which to obtain access to the user's existing accounts. |
A. | Identity theft |
B. | Cookie poisoning |
C. | Shoulder surfing |
D. | Relative identifier |
Answer» B. Cookie poisoning |
41. |
This type of attack may cause additional damage by sending data containing codes designed to trigger specific actions - for example, changing data or disclosing confidential information. |
A. | Buffer overflow |
B. | Block cipher |
C. | War dialing |
D. | Distributed denial-of-service attack |
Answer» A. Buffer overflow |
42. |
This is the forging of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. |
A. | Foot printing |
B. | Non repudiation |
C. | E-mail spoofing |
D. | Finger |
Answer» C. E-mail spoofing |
43. |
This is a type of network security attack in which the intruder takes control of a communication between two entities and masquerades as one of them. |
A. | Hijacking |
B. | Identity theft |
C. | Smurf attack |
D. | Tunneling |
Answer» A. Hijacking |
44. |
This is a compromised Web site that is being used as an attack launch point in a denialof-service attack. |
A. | Bastion host |
B. | Packet monkey |
C. | Dongle |
D. | Zombie |
Answer» D. Zombie |
45. |
This electronic "credit card" establishes a user's credentials when doing business or other transactions on the Web and is issued by a certification authority. |
A. | Private key |
B. | Digital certificate |
C. | Smart card |
D. | Ownership tag |
Answer» B. Digital certificate |
46. |
What "layer" of an e-mail message should you consider when evaluating e-mail security? |
A. | TCP/IP |
B. | SMTP |
C. | Body |
D. | All of the above |
Answer» D. All of the above |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.