This section contains more frequently asked Information Security MCQs in the various competitive exams.
1. Which of the following are possible security threats?
- Illegitimate use
- Backdoors
- Masquerading
- All of the given options are correct
2. What is a firewall?
- Firewalls are network-based security measures that control the flow of incoming and outgoing traffic
- A firewall is a program that encrypts all the programs that access the Internet.
- A firewall is a program that keeps other programs from using the network.
- Firewalls are interrupts that automatically disconnect from the internet when a threat appears
3. Which of the following involves submitting as many requests as possible to a single Internet computer or service, overloading it and preventing it from servicing legitimate requests?
- Distributed denial-of-service attacks
- Backdoor
- Masquerading
- Phishing
4. Which of the following symmetric keys can be derived from Symmetric master key?
- Authentication keys
- Key wrapping keys
- Data encryption keys
- All of the given options are correct
5. Which of the following are valid Cryptographic key types?
- Public authentication key
- Public signature verification key
- Private signature key
- All of the given options are correct
6. Is true that HTTP is an insecure protocol?
- True
- False
7. Which is the best way a system can be hardened?
- Total disk encryption coupled with strong network security protocols.
- White-list ad filtering only.
- Installing a commercial security suite.
- Virus scanning only.
8. Why is it crucial to encrypt data in transit?
- To assure that all of your information cannot be decrypted.
- To decrease your resources.
- So you can increase your chances of testing your encryption capabilities.
- To prevent unauthorized access to private networks and sensitive information during its most vulnerable state.
9. Which of the following are the basic functionalities of the IPsec Protocol ?
- Security association for policy management and traffic processing
- Security protocols for AH and ESP
- Manual and automatic key management for the internet key exchange
- All of the given options are correct
10. Can a proxy be used as a firewall? If so, how?
- No. Proxies are data encryption stations whose sole purpose is to encrypt and re-rout data.
- No. Proxies are firewalls that are maintained at locations other than that of the user.
- No. All a proxy does is re-rout Internet traffic, and thus all the malicious signals that go with it.
- Yes. A proxy acts as a network intermediary for the user that serves to control the flow of incoming and outgoing traffic.