MCQOPTIONS
Saved Bookmarks
This section includes 25 Mcqs, each offering curated multiple-choice questions to sharpen your Bachelor of Computer Applications (BCA) knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
This technology is used to measure and analyze human body characteristics for authentication purposes. |
| A. | Footprinting |
| B. | Biometrics |
| C. | JBOD |
| D. | Anthropomorphism |
| Answer» C. JBOD | |
| 2. |
This is the name for a group of programmers who are hired to expose errors or security holes in new software or to find out why a computer network's security is being broken. |
| A. | ERM group |
| B. | Computer emergency response tea |
| C. | Tiger team |
| D. | Silicone cockroach |
| Answer» D. Silicone cockroach | |
| 3. |
This is a program in which harmful code is contained inside apparently harmless programming or data. |
| A. | Snort |
| B. | Honeypot |
| C. | Blue bomb |
| D. | Trojan horse |
| Answer» E. | |
| 4. |
This is a Peripheral Component Interconnect (PCI) card that offloads SSL processing to speed up secure transactions on e-commerce Web sites. |
| A. | PCMCIA card |
| B. | Smart card |
| C. | Server accelerator card |
| D. | Network interface card |
| Answer» D. Network interface card | |
| 5. |
___________is a form of eavesdropping used to pick up telecommunication signals by monitoring the electromagnetic fields produced by the signals. |
| A. | Reverse engineering |
| B. | Magneto resistive head technology |
| C. | Van Eck phreaking |
| D. | Electronic data processing (EDP) |
| Answer» D. Electronic data processing (EDP) | |
| 6. |
This is the modification of personal information on a Web user's computer to gain unauthorized information with which to obtain access to the user's existing accounts. |
| A. | Identity theft |
| B. | Cookie poisoning |
| C. | Shoulder surfing |
| D. | Relative identifier |
| Answer» C. Shoulder surfing | |
| 7. |
This is an assault on the integrity of a security system in which the attacker substitutes a section of cipher text (encrypted text) with a different section that looks like (but is not the same as) the one removed. |
| A. | Trojan horse |
| B. | Hashing |
| C. | Switching fabric |
| D. | Cut and paste attack |
| Answer» E. | |
| 8. |
The developers of an operating system or vendor application might issue this to prevent intruders from taking advantage of a weakness in their programming. |
| A. | Cookie |
| B. | Key fob |
| C. | Watermark |
| D. | Patch |
| Answer» E. | |
| 9. |
Developed by Philip R. Zimmermann, this is the most widely used privacy-ensuring program by individuals and is also used by many corporations. |
| A. | DS |
| B. | OCSP |
| C. | Secure HTTP |
| D. | Pretty Good Privacy |
| Answer» E. | |
| 10. |
What "layer" of an e-mail message should you consider when evaluating e-mail security? |
| A. | TCP/IP |
| B. | SMTP |
| C. | Body |
| D. | All of the above |
| Answer» E. | |
| 11. |
An intruder might install this on a networked computer to collect user ids and passwords from other machines on the network. |
| A. | Passphrase |
| B. | Root kit |
| C. | Ownership tag |
| D. | Token |
| Answer» C. Ownership tag | |
| 12. |
This is an attack on a computer system that takes advantage of a particular vulnerability that the system offers to intruders. |
| A. | Port scan |
| B. | Denial of service |
| C. | Exploit |
| D. | Logic bomb |
| Answer» D. Logic bomb | |
| 13. |
This is a type of network security attack in which the intruder takes control of a communication between two entities and masquerades as one of them. |
| A. | Hijacking |
| B. | Identity theft |
| C. | Smurf attack |
| D. | Tunneling |
| Answer» B. Identity theft | |
| 14. |
Today, many Internet businesses and users take advantage of cryptography based on this approach. |
| A. | Public key infrastructure |
| B. | Output feedback |
| C. | Encrypting File System |
| D. | Single sign on |
| Answer» B. Output feedback | |
| 15. |
This is the forging of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. |
| A. | Foot printing |
| B. | Non repudiation |
| C. | E-mail spoofing |
| D. | Finger |
| Answer» D. Finger | |
| 16. |
This type of intrusion relies on the intruder's ability to trick people into breaking normal security procedures. |
| A. | Shoulder surfing |
| B. | Hijacking |
| C. | Brain fingerprinting |
| D. | Social engineering |
| Answer» E. | |
| 17. |
This is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding cipher text value and vice versa. |
| A. | Foot printing |
| B. | Hash function |
| C. | Watermark |
| D. | Electronic Code Book |
| Answer» E. | |
| 18. |
This electronic "credit card" establishes a user's credentials when doing business or other transactions on the Web and is issued by a certification authority. |
| A. | Private key |
| B. | Digital certificate |
| C. | Smart card |
| D. | Ownership tag |
| Answer» C. Smart card | |
| 19. |
This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies. |
| A. | Chaffing and winnowing |
| B. | Cryptanalysis |
| C. | Serendipity |
| D. | Brute force cracking |
| Answer» E. | |
| 20. |
This is an encryption/decryption key known only to the party or parties that exchange secret messages. |
| A. | E-signature |
| B. | Digital certificate |
| C. | Private key |
| D. | Security token |
| Answer» D. Security token | |
| 21. |
This is is the hiding of a secret message within an ordinary message and the extraction of it at its destination. |
| A. | Secret key algorithm |
| B. | Message queuing |
| C. | Spyware |
| D. | Steganography |
| Answer» E. | |
| 22. |
An IDS follows a two-step process consisting of a passive component and an active component. Which of the following is part of the active component? |
| A. | Inspection of password files to detect inadvisable passwords |
| B. | Mechanisms put in place to reenact known methods of attack and record system responses |
| C. | Inspection of system to detect policy violations |
| D. | Inspection of configuration files to detect inadvisable settings |
| Answer» C. Inspection of system to detect policy violations | |
| 23. |
"Semantics-aware" signatures automatically generated by Nemean are based on traffic at which two layers? |
| A. | Application layer |
| B. | Network layer |
| C. | Session layer |
| D. | Both a and c |
| Answer» E. | |
| 24. |
One of the most obvious places to put an IDS sensor is near the firewall. Where exactly in relation to the firewall is the most productive placement? |
| A. | Inside the firewall |
| B. | Outside the firewall |
| C. | Both |
| D. | None |
| Answer» B. Outside the firewall | |
| 25. |
In which of the following exploits does an attacker add SQL code to a Web form input box to gain access to resources or make changes to data? |
| A. | Cross-site scripting |
| B. | Command injection |
| C. | SQL injection |
| D. | Buffer overflow |
| Answer» D. Buffer overflow | |