This section contains more frequently asked Data integrity and Security MCQs in the various competitive exams.

PRACTICE IT NOW TO SHARPEN YOUR CONCEPT AND KNOWLEDGE

view hide answers

1. When is encrypted data the safest?

  • When it is being transferred via usb stick.
  • When it is in transit.
  • When it is being written. When it is at rest.
  • When it is being written.

2. Which of the following keys are used to generate random numbers?

  • Symmetric random number generation keys
  • Symmetric and asymmetric random number generation keys
  • Public signature verification key
  • Asymmetric random number generation keys

3. Which of the following is true about Public Key Encryption?

  • Anyone can encrypt with the public key and anyone can decrypt with the private key
  • Anyone can encrypt with the public key, only one person can decrypt with the private key
  • Anyone can encrypt with the private key, only one person can decrypt with the public key
  • Only one person can encrypt with the public key and anyone can decrypt with the private key

4. If you set up a BUS network, what is the major disadvantage?

  • It is entirely wireless and open to wifi-based attacks.
  • It is daisy-chained together with several cables
  • It is linked with a single cable which can be a major vulnerability.
  • It is connected in a star pattern and can be disabled by disrupting one data center.

5. What does the acronym BEAST mean in Beast Attack?

  • Breaking and Entering Against SSL/TLS
  • Browser Extension And SSL/TLS
  • Browser Exploit Against SSL/TLS
  • Breach Entering Against SSL/TLS

6. TCP is used for what three main functions?

  • Connect to the Web, deliver email, and transfer files.
  • Connect to the Web, compress data, encrypt mail.
  • Connect to the web, conceal data, transfer files.
  • Connect to the Web, encrypt data, transmit information.

7. Secure cookies have which feature?

  • They are not encrypted, just sent via secure server.
  • They are encrypted.
  • Secure cookies are passed along via encrypted programs.
  • Cookies are always traded between trusted users.

8. How are port numbers categorized?

  • Static, dynamic, enigmatic
  • Known, well-known, unknown
  • Well-known, registered, and static/dynamic.
  • Unknown, unregistered, invalid

9. Which of the following type of attack can actively modify communications or data?

  • Both Active and Passive attack
  • Neither Active nor Passive attack
  • Active attack
  • Passive attack

10. What is the top method an attacker might infect a target?

  • Social engineering, or psychological manipulation.
  • SQL injection.
  • Buffer overflow.
  • Hacking via the Internet.
Share with : Share on Linkedin Share on Twitter Share on WhatsApp Share on Facebook