This section contains more frequently asked Cryptography and Network Security Multiple Choice Questions Answers in the various competitive exams.

PRACTICE IT NOW TO SHARPEN YOUR CONCEPT AND KNOWLEDGE

view hide answers

1. Which of the following refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user's consent?

  • Malware
  • Botnet
  • Trojan horse
  • Spyware

2. What is a computer worm?

  • It is software designed to exploit networks.
  • It is software designed to analyze and search for open ports.
  • It is a software utilized to scan packets on open networks.
  • It is malware designed to infect other computers.

3. Is a Unix-based system vulnerable to viruses?

  • Yes. The split is approximately 50/50 when it comes to attacks on Windows vs. Unix based systems.
  • Yes, the majority of viruses attack Unix-based systems.
  • No. Linux systems are totally impervious to attacks.
  • Yes, however the majority are coded to attack Windows-based systems.

4. Which of the following protocol used Port 443 and Port 80 respectively

  • HTTPS and HTTP
  • XHTML
  • HTTP and HTTPS
  • DHTML

5. Which of the following is a means to access a computer program or entire computer system bypassing all security mechanisms?

  • Backdoor
  • Masquerading
  • Phishing
  • Trojan Horse

6. What does TCP mean?

  • Total Content Positioning
  • Transmission Control Protocol
  • Transmittable Constant Protocol
  • Technical Control Panel

7. What does cross-site scripting allow for attackers?

  • Direct introduction of viruses into a victims computer.
  • The introduction of worm viruses into the victims website.
  • A phishing attack that automatically downloads the victims personal information.
  • Injection of client-side scripts into web pages.

8. Which of the following is collection of Internet-connected programs communicating with other similar programs in order to perform tasks?

  • Botnet
  • Spyware
  • Trojan horse
  • Malware

9. What are TLS and SSL?

  • Internet protocols.
  • Network layers.
  • Internet layers
  • Cryptographic protocols.

10. Who was TLS defined by?

  • The DEA
  • OSHA
  • Internet Engineering Task Force
  • NSA
Share with : Share on Linkedin Share on Twitter Share on WhatsApp Share on Facebook