Computer System Security MCQ with answers -07

Posted by

COMPUTER SYSTEM SECURITY MCQ with all answers (100% free pdf download)

Confidentiality Policies: Confinement Principle ,Detour Unix user IDs process IDs and
privileges, More on confinement techniques ,System call interposition ,Error 404 digital
Hacking in India part 2 chase , VM based isolation ,Confinement principle ,Software fault
isolation , Rootkits ,Intrusion Detection Systems

26. When original data is changed to make it
non-meaningful by attacker it is known as
a. Masquerade
b. Replay
c. Modification of Messages
d. Traffic analysis
Answer: c

27. Which is the type of attack when Network is made unavailable for user
a. Masquerade
b. Replay
c. Modification
d. Denial of Service
Answer: d

28. Modification of Data is done in:
a. Both Active and Passive Attacks
b. Neither Active and Passive Attacks
c. Active Attacks
d. Passive Attacks
Answer: a

29. The information that gets transformed in encryption is
a. Plain text
b. Parallel text
c. Encrypted text
d. Decrypted text
Answer: a

30. The process of transforming plain text into unreadable text.
a. Decryption
b. Encryption
c. Network Security
d. Information Hiding
Answer: b

31. A process of making the encrypted text readable again.
a. Decryption
b. Encryption
c. Network Security
d. Information Hiding
Answer: a

32. A unique piece of information that is used in encryption.
a. Cipher
b. Plain Text
c. Key
d. Cipher
Answer: c

33. Assurance that authentic user is taking part in communication is:
a. Authentication
b. Authorization
c. Access Control
d. Auditing
Answer: a

34. AT M pin while withdrawing money is an example of using:
a. Authentication
b. Authorization
c. Access Control
d. Auditing
Answer: b

35. Study of creating a d using encryption and decryption techniques.
a. Cipher
b. Cryptography
c. Encryption
d. Decryption
Answer: b

36. An attack in which the user receives unwanted amount of emails.
a. Smurfing
b. Denial of service
c. E-mail bombing
d. Ping storm
Answer: c

37. The process of disguising plaintext in such a way that itssubstance gets hidden (into what is known as cipher-text) iscalled _________________
a. cryptanalysis
b. decryption
c. reverse engineering
d. encryption
Answer: d

38. In _____________________ same keys are implemented for encrypting as well as decrypting the information.
a. Symmetric Key Encryption
b. Asymmetric Key Encryption
c. Asymmetric Key Decryption
d. Hash-based Key Encryption
Answer: a

39. The procedure to add bits to the last block is termed as__________
a. decryption
b. hashing
c. tuning
d. padding
Answer: d

40. In asymmetric key cryptography, the private key is kept by______
a. sender
b. receiver
c. sender and receiver
d. all the connected devices to the network
Answer: b

41. Cryptanalysis is used __________
a. to find some insecurity in a cryptographic scheme
b. to increase the speed
c. to encrypt the data
d. to make new ciphers
Answer: a

42. Conventional cryptography is also known as _____________ or symmetric-key encryption.
a. secret-key
b. public key
c. protected key
d. primary key
Answer: a

43. _____________________ is the art & science of cracking the cipher-text without knowing the key.
a. Cracking
b. Cryptanalysis
c. Cryptography
d. Crypto-hacking
Answer: b

44. In _____________ a sequence of actions is carried out on this block after a block of plain-text bits is chosen for generating a block of cipher-text bits.
a. Block Cipher
b. One-time pad
c. Hash functions
d. Vigenere Cipher
Answer: a

45. Which of the following programming languages have common buffer overflow problem in the development of applications?
a. C, Ruby
b. C, C++
c. Python, Ruby
d. C, Python
Answer: – b

46. Which type of buffer overflows are common among attackers?
a. Memory-based
b. Queue-based
c. Stack-based
d. Heap-based
Answer: – c

47. In ___________ attack, malicious code is pushed into _______.
a. buffer-overflow, stack
b. buffer-overflow, queue
c. buffer-overflow,memory-card
d. buffer-overflow,external drive
Answer:- a

48. In case of integer overflow, Which of the following option/s is/are true?
a. It is a result of an attempt to store a value greater than the maximum value an integer can store
b. Integer overflow can compromise a program’s reliability and security
c. Both A and B
d. None of the above
Answer :- c

49. A string which contains ___________ parameter/s, is called ______ string.
a. Format, text
b. Text, format
c. text and format, format
d. None of the above
Answer- b

50. If we talk about control hijacking, which of the following is true ?
a. In Buffer overflow attacks, stack based attacks are more common than heap based attack.
b. Integer overflow attacks is not a type of control hijacking.
c. Format string vulnerabilities are used to prevent control hijacking.
d. All of the above
Answer :- b