This section contains more frequently asked Data integrity and Security MCQs in the various competitive exams.
1. When is encrypted data the safest?
- When it is being transferred via usb stick.
- When it is in transit.
- When it is being written. When it is at rest.
- When it is being written.
2. Which of the following keys are used to generate random numbers?
- Symmetric random number generation keys
- Symmetric and asymmetric random number generation keys
- Public signature verification key
- Asymmetric random number generation keys
3. Which of the following is true about Public Key Encryption?
- Anyone can encrypt with the public key and anyone can decrypt with the private key
- Anyone can encrypt with the public key, only one person can decrypt with the private key
- Anyone can encrypt with the private key, only one person can decrypt with the public key
- Only one person can encrypt with the public key and anyone can decrypt with the private key
4. If you set up a BUS network, what is the major disadvantage?
- It is entirely wireless and open to wifi-based attacks.
- It is daisy-chained together with several cables
- It is linked with a single cable which can be a major vulnerability.
- It is connected in a star pattern and can be disabled by disrupting one data center.
5. What does the acronym BEAST mean in Beast Attack?
- Breaking and Entering Against SSL/TLS
- Browser Extension And SSL/TLS
- Browser Exploit Against SSL/TLS
- Breach Entering Against SSL/TLS
6. TCP is used for what three main functions?
- Connect to the Web, deliver email, and transfer files.
- Connect to the Web, compress data, encrypt mail.
- Connect to the web, conceal data, transfer files.
- Connect to the Web, encrypt data, transmit information.
- They are not encrypted, just sent via secure server.
- They are encrypted.
- Secure cookies are passed along via encrypted programs.
- Cookies are always traded between trusted users.
8. How are port numbers categorized?
- Static, dynamic, enigmatic
- Known, well-known, unknown
- Well-known, registered, and static/dynamic.
- Unknown, unregistered, invalid
9. Which of the following type of attack can actively modify communications or data?
- Both Active and Passive attack
- Neither Active nor Passive attack
- Active attack
- Passive attack
10. What is the top method an attacker might infect a target?
- Social engineering, or psychological manipulation.
- SQL injection.
- Buffer overflow.
- Hacking via the Internet.