This section contains more frequently asked Information Security Multiple Choice Questions Answers in the various competitive exams.
1. In which of the following fraud methods is a legitimate/legal-looking email sent in an attempt to gather personal and financial information from recipients?
- Virus
- Masquerading
- Phishing
- Malware
2. Which of the following is TRUE about TLS?
- The HMAC construction used by most TLS cipher suites is specified in RFC 2104
- Provides protection against a downgrade of the protocol to a previous (less secure) version or a weaker cipher suite
- The message that ends the handshake sends a hash of all the exchanged handshake messages seen by both parties
- All of the given options are correct
3. Which of the following is a VALID type of Key Management System?
- Third-Party Key Management System
- Dynamic Key Management System
- Integrated Key Management System
- Both Integrated Key Management System and Third-Party Key Management System
4. What is one way that a web browser is vulnerable to breaching?
- A browser can be infected by closing it.
- A virus can be sent through the monitor.
- A browser plugin can be exploited.
- Web browsers are impervious to exploitation.
5. What two main categories of network topologies are there?
- Digital and Topological
- Direct and Indirect
- Close and Distant
- Physical and logical.
6. What is another name for an insecure plugin?
- Hardware
- Software
- Firmware
- Malware
7. A digital signature scheme consists of which of the following typical algorithms?
- Key generation, Signing and Signature verifying algorithm
- Signature verifying algorithm
- Key generation algorithm
- Signing algorithm
8. Which of the following is TRUE about SSL 3.0?
- It has a weak MAC construction that uses the MD5 hash function with a secret prefix
- Identical cryptographic keys are used for message authentication and encryption
- SSL 3.0 improved upon SSL 2.0 by adding SHA-1 based ciphers and support for certificate authentication
- It assumes a single service and a fixed domain certificate, which clashes with the standard feature of virtual hosting in Web servers
9. There are two types of firewall. What are they?
- Internet-based and home-based.
- Hardware and software.
- Remote and local
- Digital and electronic.
10. True of False? Malware exists which affects both Windows and Linux systems.
- True
- False