This section contains more frequently asked Data integrity and Security Multiple Choice Questions Answers in the various competitive exams.

PRACTICE IT NOW TO SHARPEN YOUR CONCEPT AND KNOWLEDGE

view hide answers

1. Secure Sockets Layer is a predecessor of which cryptographic protocol?

  • IPSec
  • Transport Layer Security
  • SSL 3.0
  • HTTPS

2. An SQL injection is often used to attack what?

  • Small scale machines such as diebold ATMs
  • Large-scale sequel databases such as those containing credit card information.
  • Servers running SQL databases similar to Hadoop or Hive.
  • Servers built on NoSQL

3. Which version of TLS is vulnerable to BEAST exploit?

  • TLS 1.1
  • TLS 3.0
  • TLS 0.5
  • TLS 2.0
  • TLS 1.0

4. According to OWASP what is the most dangerous web vulnerability?

  • Injections (SQL, LDAP, etc)
  • Cross-site-scripting (XSS)
  • Security Misconfiguration
  • Cross-Site Request Forgery (CSRF)
  • Sensitive Data Exposure

5. Sandboxing does what to computer programs?

  • Sandboxing protects your system by trapping all the viruses.
  • It separates and isolates them.
  • Sandboxing doesn't protect your system.
  • Sandboxes protect your programs by isolating all the other programs except the one you are using at the time.

6. What is largely considered the most advanced computer virus?

  • Conficker Virus
  • Zeus
  • Stuxnet.
  • agent.biz

7. What is necessary for a cross-site script attack with cookies to be thwarted?

  • CAPTCHAs
  • Virtual machines
  • Proxies
  • Firewalls

8. What are the two primary classifications of cross-site scripting?

  • DOM-based and persistent
  • traditional and DOM-based
  • traditional and non-persistent
  • non-persistent and persistent.

9. Which of the following is a VALID authorization key?

  • Public authorization key
  • Public ephemeral key authorization key
  • Asymmetric authorization keys
  • Symmetric authorization keys

10. Which of the following is a VALID digital signature key?

  • Public signature authentication key
  • Private signature authentication key
  • Symmetric signature authentication key
  • Private signature key
Share with : Share on Linkedin Share on Twitter Share on WhatsApp Share on Facebook