

MCQOPTIONS
Saved Bookmarks
This section includes 379 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
1. |
This type of intrusion relies on the intruder's ability to trick people into breakingnormal security procedures. |
A. | Shoulder surfing |
B. | Hijacking |
C. | Brain fingerprinting |
D. | Social engineering |
Answer» E. | |
2. |
In which of the following exploits does an attacker insert malicious coding into a link that appears to be from a trustworthy source? |
A. | Cross-site scripting |
B. | Command injection |
C. | Path traversal attack |
D. | Buffer overflow |
Answer» B. Command injection | |
3. |
Today, many Internet businesses and users take advantage of cryptography based onthis approach. |
A. | Public key infrastructure |
B. | Output feedback |
C. | Encrypting File System |
D. | Single sign on |
Answer» B. Output feedback | |
4. |
In what type of attack does an intruder manipulate a URL in such a way that the Web server executes or reveals the contents of a file anywhere on the server, including those lying outside the document root directory? |
A. | Cross-site scripting |
B. | Command injection |
C. | SQL injection |
D. | Path traversal attacks |
Answer» E. | |
5. |
An intruder might install this on a networked computer to collect user ids andpasswords from other machines on the network. |
A. | Passphrase |
B. | Root kit |
C. | Ownership tag |
D. | Token |
Answer» C. Ownership tag | |
6. |
This type of attack may cause additional damage by sending data containing codes designed to trigger specific actions - for example, changing data or disclosing confidential information. |
A. | Buffer overflow |
B. | Block cipher |
C. | War dialing |
D. | Distributed denial-of-service attack |
Answer» B. Block cipher | |
7. |
One of the most obvious places to put an IDS sensor is near the firewall. Where exactlyin relation to the firewall is the most productive placement? |
A. | Inside the firewall |
B. | Outside the firewall |
C. | Both |
D. | None |
Answer» B. Outside the firewall | |
8. |
This is a mechanism for ensuring that only authorized users can copy or use specific software applications. |
A. | Authorized program analysis report |
B. | Private key |
C. | Service level agreement |
D. | Dongle |
Answer» E. | |
9. |
This was commonly used in cryptography during World War II. |
A. | Tunneling |
B. | Personalization |
C. | Van Eck phreaking |
D. | One-time pad |
Answer» E. | |
10. |
What "layer" of an e-mail message should you consider when evaluating e-mailsecurity? |
A. | TCP/IP |
B. | SMTP |
C. | Body |
D. | All of the above |
Answer» E. | |
11. |
___________is a form of eavesdropping used to pick up telecommunication signals bymonitoring the electromagnetic fields produced by the signals. |
A. | Reverse engineering |
B. | Magneto resistive head technology |
C. | Van Eck phreaking |
D. | Electronic data processing (EDP) |
Answer» D. Electronic data processing (EDP) | |
12. |
In which of the following exploits does an attacker add SQL code to a Web form inputbox to gain access to resources or make changes to data? |
A. | Cross-site scripting |
B. | Command injection |
C. | SQL injection |
D. | Buffer overflow |
Answer» D. Buffer overflow | |
13. |
This is a trial and error method used to decode encrypted data through exhaustiveeffort rather than employing intellectual strategies. |
A. | Chaffing and winnowing |
B. | Cryptanalysis |
C. | Serendipity |
D. | Brute force cracking |
Answer» E. | |
14. |
This is the forging of an e-mail header so that the message appears to have originatedfrom someone or somewhere other than the actual source. |
A. | Foot printing |
B. | Non repudiation |
C. | E-mail spoofing |
D. | Finger |
Answer» D. Finger | |
15. |
Developed by Philip R. Zimmermann, this is the most widely used privacy-ensuringprogram by individuals and is also used by many corporations. |
A. | DS |
B. | OCSP |
C. | Secure HTTP |
D. | Pretty Good Privacy |
Answer» E. | |
16. |
This is the encryption algorithm that will begin to supplant the Data Encryption Standard (DES) - and later Triple DES - over the next few years as the new standard encryption algorithm. |
A. | Rijndael |
B. | Kerberos |
C. | Blowfish |
D. | IPsec |
Answer» B. Kerberos | |
17. |
This technology is used to measure and analyze human body characteristics forauthentication purposes. |
A. | Footprinting |
B. | Biometrics |
C. | JBOD |
D. | Anthropomorphism |
Answer» C. JBOD | |
18. |
Which of the following is NOT recommended for securing Web applications against authenticated users? |
A. | Client-side data validation |
B. | Filtering data with a default deny regular expression |
C. | Running the application under least privileges necessary |
D. | Using parameterized queries to access a database |
Answer» B. Filtering data with a default deny regular expression | |
19. |
This is an encryption/decryption key known only to the party or parties that exchangesecret messages. |
A. | E-signature |
B. | Digital certificate |
C. | Private key |
D. | Security token |
Answer» D. Security token | |
20. |
This is the name for the issuer of a PKI certificate. |
A. | Man in the middle |
B. | Certificate authority |
C. | Resource Access Control Facility |
D. | Script kiddy |
Answer» C. Resource Access Control Facility | |
21. |
This is the name for a group of programmers who are hired to expose errors or securityholes in new software or to find out why a computer network's security is being broken. |
A. | ERM group |
B. | Computer emergency response tea |
C. | Tiger team |
D. | Silicone cockroach |
Answer» D. Silicone cockroach | |
22. |
This is is the hiding of a secret message within an ordinary message and the extractionof it at its destination. |
A. | Secret key algorithm |
B. | Message queuing |
C. | Spyware |
D. | Steganography |
Answer» E. | |
23. |
The developers of an operating system or vendor application might issue this to preventintruders from taking advantage of a weakness in their programming. |
A. | Cookie |
B. | Key fob |
C. | Watermark |
D. | Patch |
Answer» E. | |
24. |
In password protection, this is a random string of data used to modify a password hash. |
A. | Sheepdip |
B. | Salt |
C. | Bypass |
D. | Dongle |
Answer» C. Bypass | |
25. |
This is a Peripheral Component Interconnect (PCI) card that offloads SSL processing tospeed up secure transactions on e-commerce Web sites. |
A. | PCMCIA card |
B. | Smart card |
C. | Server accelerator card |
D. | Network interface card |
Answer» D. Network interface card | |
26. |
This is the modification of personal information on a Web user's computer to gainunauthorized information with which to obtain access to the user's existing accounts. |
A. | Identity theft |
B. | Cookie poisoning |
C. | Shoulder surfing |
D. | Relative identifier |
Answer» C. Shoulder surfing | |
27. |
Which of the following is true of improper error handling? |
A. | Attackers can use error messages to extract specific information from a system. |
B. | Attackers can use unexpected errors to knock an application off line, creating a denial-of- service attack. |
C. | Unexpected errors can provide an attacker with a buffer or stack overflow condition that sets the stage for an arbitrary code execution. |
D. | All of the above. |
Answer» E. | |
28. |
__________ is an electronic or paper log used to track computer activity. |
A. | Traceroute |
B. | Cookie |
C. | Weblog |
D. | Audit trail |
Answer» E. | |
29. |
This enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. |
A. | Security Identifier (SID) |
B. | Public key infrastructure (PKI) |
C. | Internet Assigned Numbers Authority (IANA) |
D. | Private Branch Exchange (PBX) |
Answer» C. Internet Assigned Numbers Authority (IANA) | |
30. |
This is a mode of operation for a block cipher, with the characteristic that each possibleblock of plaintext has a defined corresponding cipher text value and vice versa. |
A. | Foot printing |
B. | Hash function |
C. | Watermark |
D. | Electronic Code Book |
Answer» E. | |
31. |
This is an attack on a computer system that takes advantage of a particularvulnerability that the system offers to intruders. |
A. | Port scan |
B. | Denial of service |
C. | Exploit |
D. | Logic bomb |
Answer» D. Logic bomb | |
32. |
This electronic "credit card" establishes a user's credentials when doing business orother transactions on the Web and is issued by a certification authority. |
A. | Private key |
B. | Digital certificate |
C. | Smart card |
D. | Ownership tag |
Answer» C. Smart card | |
33. |
This is the inclusion of a secret message in otherwise unencrypted text or images. |
A. | Masquerade |
B. | Steganography |
C. | Spoof |
D. | Eye-in-hand system |
Answer» C. Spoof | |
34. |
This is a program in which harmful code is contained inside apparently harmlessprogramming or data. |
A. | Snort |
B. | Honeypot |
C. | Blue bomb |
D. | Trojan horse |
Answer» E. | |
35. |
This is an assault on the integrity of a security system in which the attacker substitutesa section of cipher text (encrypted text) with a different section that looks like (but is not the same as) the one removed. |
A. | Trojan horse |
B. | Hashing |
C. | Switching fabric |
D. | Cut and paste attack |
Answer» E. | |
36. |
This is a series of messages sent by someone attempting to break into a computer to learn which computer network services the computer provides. |
A. | Bit robbing |
B. | Web services description language (WSDL) |
C. | Jabber |
D. | Port scan |
Answer» E. | |
37. |
This is a compromised Web site that is being used as an attack launch point in a denialof-service attack. |
A. | Bastion host |
B. | Packet monkey |
C. | Dongle |
D. | Zombie |
Answer» E. | |
38. |
"Semantics-aware" signatures automatically generated by Nemean are based on trafficat which two layers? |
A. | Application layer |
B. | Network layer |
C. | Session layer |
D. | Both a and c |
Answer» E. | |
39. |
An IDS follows a two-step process consisting of a passive component and an activecomponent. Which of the following is part of the active component? |
A. | Inspection of password files to detect inadvisable passwords |
B. | Mechanisms put in place to reenact known methods of attack and record system responses |
C. | Inspection of system to detect policy violations |
D. | Inspection of configuration files to detect inadvisable settings |
Answer» C. Inspection of system to detect policy violations | |
40. |
This is a type of network security attack in which the intruder takes control of acommunication between two entities and masquerades as one of them. |
A. | Hijacking |
B. | Identity theft |
C. | Smurf attack |
D. | Tunneling |
Answer» B. Identity theft | |
41. |
Which of the following is characteristic of spyware? |
A. | Blocking access to antivirus and antispyware updates |
B. | Aggregating surfing habits across multiple users for advertising |
C. | Customizing search results based on an advertiser's needs |
D. | All of the above |
Answer» C. Customizing search results based on an advertiser's needs | |
42. |
Investigators should not rely on one piece of digital evidence when examining an alibi – they should look for an associated _______. |
A. | cybertrail |
B. | piece of physical evidence |
C. | statement |
D. | none of the above |
Answer» B. piece of physical evidence | |
43. |
The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user’s public key. |
A. | true |
B. | false |
Answer» C. | |
44. |
“Elliptic curve cryptography follows the associative property.” |
A. | true |
B. | false |
Answer» B. false | |
45. |
is the art & science of cracking the cipher-text without knowing the key. |
A. | cracking |
B. | cryptanalysis |
C. | cryptography |
D. | crypto-hacking |
Answer» C. cryptography | |
46. |
ATM pin while withdrawing money is an example of using: |
A. | authentication |
B. | authorization |
C. | access control |
D. | auditing |
Answer» C. access control | |
47. |
Assurance that authentic user is taking part in communication is: |
A. | authentication |
B. | authorization |
C. | access control |
D. | auditing |
Answer» B. authorization | |
48. |
Modification of Data is done in: |
A. | both active and passive attacks |
B. | neither active and passive attacks |
C. | active attacks |
D. | passive attacks |
Answer» B. neither active and passive attacks | |
49. |
Which is the type of attack when Network is made unavailable for user |
A. | masquerade |
B. | replay |
C. | modification |
D. | denial of service |
Answer» E. | |
50. |
When original data is changed to make it non-meaningful by attacker it is known as |
A. | masquerade |
B. | replay |
C. | modification of messages |
D. | traffic analysis |
Answer» D. traffic analysis | |