Computer System Security MCQ with answers -05

Posted by

COMPUTER SYSTEM SECURITY MCQ with all answers (100% free pdf download)

Computer System Security Introduction: Introduction, What is computer security and what to
learn? , Sample Attacks, The Marketplace for vulnerabilities, Error 404 Hacking digital India
part 1 chase.
Hijacking & Defense: Control Hijacking ,More Control Hijacking attacks integer overflow
,More Control Hijacking attacks format string vulnerabilities, Defense against Control Hijacking – Platform Defenses, Defense against Control Hijacking – Run-time Defenses, Advanced
Control Hijacking attacks.

101. Which of the following principle of cyber security restricts how privileges are initiated whenever any object or subject is created?
a. Least privilege
b. Open-Design
c. Fail-safe Defaults
d. None of the above
Answer: c

102. Which of the following can also consider as the instances of Open Design?
a. CSS
b. DVD Player
c. Only A
d. Both A and B

103. Which one of the following principles states that sometimes it is become more desirable to rescored the details of intrusion that to adopt more efficient measure to avoid it?
a. Least common mechanism
b. Compromise recording
c. Psychological acceptability
d. Work factor
Answer: b

104. Which of the following statements is true about the VPN in Network security?
a. It is a type of device that helps to ensure that communication between a device and a network is secure.
b. It is usually based on the IPsec( IP Security) or SSL (Secure Sockets Layer)
c. It typically creates a secure, encrypted virtual “tunnel” over the open internet
d. All of the above
Answer: d

105. Which of the following is a type of independent malicious program that never required any host program?
a. Trojan Horse
b. Worm
c. Trap Door
d. Virus
Answer: b

106. Which of the following usually considered as the default port number of apache and several other web servers?
a. 20
b. 40
c. 80
d. 87
Answer: c

107. DNS translates a Domain name into _________
a. Hex
b. Binary
c. IP
d. URL
Answer: d

108. Which one of the following systems cannot be considered as an example of the operating systems?
a. Windows 8
b. Red Hat Linux
c. BSD Linux
d. Microsoft Office
Answer: d

109. In the CIA Triad, which one of the following is not involved?
a. Availability
b. Confidentiality
c. Authenticity
d. Integrity
Answer: c

110. In an any organization, company or firm the policies of information security come under__________
a. CIA Triad
b. Confidentiality
c. Authenticity
d. None of the above
Answer: a

111. Why are the factors like Confidentiality, Integrity, Availability, and Authenticity considered as the fundamentals?
a. They help in understanding the hacking process
b. These are the main elements for any security breach
c. They help to understand the security and its components in a better manner
d. All of the above
Answer: c

112. In order to ensure the security of the data/ information, we need to ____________ the data:
a. Encrypt
b. Decrypt
c. Delete
d. None of the above
Answer: a

113. Which one of the following is considered as the most secure Linux operating system that also provides anonymity and the incognito option for securing the user’s information?
a. Ubuntu
b. Tails
c. Fedora
d. All of the above
Answer: b

114. Which type following UNIX account provides all types of privileges and rights which one can perform administrative functions?
a. Client
b. Guest
c. Root
d. Administrative
Answer: d

115. Which of the following is considered as the first hacker’s conference?
Answer: c