This section contains more frequently asked Information Security Multiple Choice Questions Answers in the various competitive exams.

PRACTICE IT NOW TO SHARPEN YOUR CONCEPT AND KNOWLEDGE

view hide answers

1. In which of the following fraud methods is a legitimate/legal-looking email sent in an attempt to gather personal and financial information from recipients?

  • Virus
  • Masquerading
  • Phishing
  • Malware

2. Which of the following is TRUE about TLS?

  • The HMAC construction used by most TLS cipher suites is specified in RFC 2104
  • Provides protection against a downgrade of the protocol to a previous (less secure) version or a weaker cipher suite
  • The message that ends the handshake sends a hash of all the exchanged handshake messages seen by both parties
  • All of the given options are correct

3. Which of the following is a VALID type of Key Management System?

  • Third-Party Key Management System
  • Dynamic Key Management System
  • Integrated Key Management System
  • Both Integrated Key Management System and Third-Party Key Management System

4. What is one way that a web browser is vulnerable to breaching?

  • A browser can be infected by closing it.
  • A virus can be sent through the monitor.
  • A browser plugin can be exploited.
  • Web browsers are impervious to exploitation.

5. What two main categories of network topologies are there?

  • Digital and Topological
  • Direct and Indirect
  • Close and Distant
  • Physical and logical.

6. What is another name for an insecure plugin?

  • Hardware
  • Software
  • Firmware
  • Malware

7. A digital signature scheme consists of which of the following typical algorithms?

  • Key generation, Signing and Signature verifying algorithm
  • Signature verifying algorithm
  • Key generation algorithm
  • Signing algorithm

8. Which of the following is TRUE about SSL 3.0?

  • It has a weak MAC construction that uses the MD5 hash function with a secret prefix
  • Identical cryptographic keys are used for message authentication and encryption
  • SSL 3.0 improved upon SSL 2.0 by adding SHA-1 based ciphers and support for certificate authentication
  • It assumes a single service and a fixed domain certificate, which clashes with the standard feature of virtual hosting in Web servers

9. There are two types of firewall. What are they?

  • Internet-based and home-based.
  • Hardware and software.
  • Remote and local
  • Digital and electronic.

10. True of False? Malware exists which affects both Windows and Linux systems.

  • True
  • False
Share with : Share on Linkedin Share on Twitter Share on WhatsApp Share on Facebook