This section contains more frequently asked Information Security MCQs in the various competitive exams.

PRACTICE IT NOW TO SHARPEN YOUR CONCEPT AND KNOWLEDGE

view hide answers

1. Which of the following are possible security threats?

  • Illegitimate use
  • Backdoors
  • Masquerading
  • All of the given options are correct

2. What is a firewall?

  • Firewalls are network-based security measures that control the flow of incoming and outgoing traffic
  • A firewall is a program that encrypts all the programs that access the Internet.
  • A firewall is a program that keeps other programs from using the network.
  • Firewalls are interrupts that automatically disconnect from the internet when a threat appears

3. Which of the following involves submitting as many requests as possible to a single Internet computer or service, overloading it and preventing it from servicing legitimate requests?

  • Distributed denial-of-service attacks
  • Backdoor
  • Masquerading
  • Phishing

4. Which of the following symmetric keys can be derived from Symmetric master key?

  • Authentication keys
  • Key wrapping keys
  • Data encryption keys
  • All of the given options are correct

5. Which of the following are valid Cryptographic key types?

  • Public authentication key
  • Public signature verification key
  • Private signature key
  • All of the given options are correct

6. Is true that HTTP is an insecure protocol?

  • True
  • False

7. Which is the best way a system can be hardened?

  • Total disk encryption coupled with strong network security protocols.
  • White-list ad filtering only.
  • Installing a commercial security suite.
  • Virus scanning only.

8. Why is it crucial to encrypt data in transit?

  • To assure that all of your information cannot be decrypted.
  • To decrease your resources.
  • So you can increase your chances of testing your encryption capabilities.
  • To prevent unauthorized access to private networks and sensitive information during its most vulnerable state.

9. Which of the following are the basic functionalities of the IPsec Protocol ?

  • Security association for policy management and traffic processing
  • Security protocols for AH and ESP
  • Manual and automatic key management for the internet key exchange
  • All of the given options are correct

10. Can a proxy be used as a firewall? If so, how?

  • No. Proxies are data encryption stations whose sole purpose is to encrypt and re-rout data.
  • No. Proxies are firewalls that are maintained at locations other than that of the user.
  • No. All a proxy does is re-rout Internet traffic, and thus all the malicious signals that go with it.
  • Yes. A proxy acts as a network intermediary for the user that serves to control the flow of incoming and outgoing traffic.
Share with : Share on Linkedin Share on Twitter Share on WhatsApp Share on Facebook