Nis MCQ QB1
Nis MCQ QB1
Nis MCQ QB1
Question Bank 1
D. All of these
2. All of the following are examples of real security and privacy threats except:
A. Hackers
B. Virus
C. Spam
D. Worm
C. Spam
3. Trojan horses are very similar to virus in the matter that they are computer
programs that replicate copies of themselves
A. True
B. False
B. False
B. Spyware
A. Man made
C. Worm
D. None Of The Above
A. Spam
A. Ignorance
B. Stalking
C. Identity theft
D. Phishing
B. Stalking
C. DoS attacks
A. True
C. Firewall
13. It allow a visited website to store its own information about a user on the
user’s computer.
A. Spam
B. Cookies
C. Malware
D. Adware
B. Cookies
A. True
A. Cyber ethics
B. X.509
18. Which of the following technique is used to verify the integrity of the
message?
A. Message Digest
Cwipedia.in NIS 22620 QB1
B. Digital signature
C. Decryption algorithm
D. Protocol
A. Message digest
B. Availability
21. Transit time and response time measure the _______ of a network
A. Performance
B. Reliability
C. Security
D. Longevity
Cwipedia.in NIS 22620 QB1
A. Performance
22. The number of users on a network has the greatest impact on the
network's _______
A. Performance
B. Reliability
C. Security
D. none of the above
A. Performance
B. Reliability
A. Catastrophe
B. The number of users
C. The type of transmission medium
D. Unauthorized access
A. Catastrophe
C. Security
C. Security
C. Security
B. Virus
C. Security
31. Unauthorized access and viruses are issues dealing with network
_______
A. Performance
B. Reliability
C. Security
D. none of the above
C. Security
Cwipedia.in NIS 22620 QB1
C. Security
B. reliability
A. Performance
36. When a network upgrades to a transmission medium with a data rate that
is 100 times faster, this improves the _______ of the network.
A. Performance
B. Reliability
C. Security
D. none of the above
A. Performance
37. A company doubles the number of nodes on its network. The greatest
impact will be on the _______ of the network
A. Performance
B. Reliability
C. Security
D. none of the above
A. Performance
38. A company changes its network configuration so that only one router
instead of two can access the Internet. The greatest impact will be on the
_______ of the network
A. Performance
B. Reliability
C. Security
D. None of the above
Cwipedia.in NIS 22620 QB1
C. Security
39. A company requires its users to change passwords every month. This
improves the _______ of the network
A. Performance
B. Reliability
C. Security
D. none of the above
C. Security
40. A company buys a computer to serve as a backup to its main server. This
will mainly affect the _______ of the network.
A. Performance
B. Reliability
C. Security
D. none of the above
B. Reliability
41. A company requires each employee to power off his computer at the end
of the day. This rule was implemented to make the network _______
A. perform better
B. more reliable
C. More Secure
D. more error-free
C. more secure
Cwipedia.in NIS 22620 QB1
42. What Security tradeoff occurs while using IDS (Intrusion Detection
System)?
A. Change in permission
B. Login Failures
C. Change in privilege
D. Performance Degradation
D. Performance degradation
B. S/MIME is used
(iv) Protecting messages sent on the internet from being read and understood
by unauthorized persons/organizations
A. i, ii
B. ii, iii
C. iii, iv
D. I, Iii, Iv
D. i, iii, iv
48. A firewall is a
A. wall built to prevent fires from damaging a corporate intranet
B. security device deployed at the boundary of a company to
prevent unauthorized physical access
C. Security Device Deployed At The Boundary Of A Corporate
Intranet To Protect It From Unauthorized Access
D. device to prevent all accesses from the internet to the corporate
intranet
C. filters packets travelling from and to the intranet from the internet
C. the bank has to keep a database of the public keys of all customers
55. The bank has to have the public keys of all customers in SET protocol as
it has to
A. Check The Digital Signature Of Customers
B. communicate with merchants
C. communicate with merchants credit card company
D. certify their keys
B. customers to business
C. Business To Business
D. banks to banks
C. business to business
58. In the NetBill’s protocol for small payments for services available in the
internet
(i) the customer is charged only when the information is delivered
(ii)the vendor is guaranteed payment when information is delivered
(iii) the customer must have a certified credit card
(iv) the customer must have a valid public key
A. i, ii
B. i, ii, iii
C. i, ii, iii, iv
D. I, Ii, Iv
D. i, ii, iv
(i) Key to decrypt information is sent to customer by NetBill only when there is
enough amount in debit account
(ii) The vendor supplies the key to NetBill server when he receives payment
(iii) Checksum of encrypted information received by customer is attached to
his payment order
(iv) Vendor does not encrypt information purchased by customer
A. i, ii
B. I, Ii, Iii
C. i, ii, iii, iv
D. i, ii, iv
B. i, ii, iii
B. a customer buys several electronic coins which are digitally signed by coin
issuing bank
B. i, ii, iii
C. i, ii, iii, iv
D. i and iv
Cwipedia.in NIS 22620 QB1
C. WFGHFFFIWGF
69. The following ciphertext was received. The plaintext was permuted using
permutation (34152) and substitution. Substitute character by character +3 (A
Æ D, etc). The plain text after decryption is: Cipher text :PDLJDLXHVQC
A. MAIGAIUESNZ
B. IAMAGENIUSZ
C. LDPDJHPLXVZ
D. IAMAGENIUSC
B. IAMAGENIUSZ
Cwipedia.in NIS 22620 QB1
73. DES
(i) is a symmetric key encryption method
(ii) guarantees absolute security
(iii) is implementable as hardware VLSI chip
Cwipedia.in NIS 22620 QB1
C. i and iii
B. Working on 64-bit blocks of plain text and 56 bit keys by applying DES
algorithm for three rounds.
Cwipedia.in NIS 22620 QB1
B. in which each person who wants to communicate has two keys; a private
key known to him only and a public key which is publicized to enable others to
send message to him.
81. In public key encryption system if A encrypts a message using his private
key and sends it to B
A. If B Knows It Is From A He Can Decrypt It Using A’s Public Key
B. Even if B knows who sent the message it cannot be decrypted
C. It cannot be decrypted at all as no one knows A’s private key
D. A should send his public key with the message
Cwipedia.in NIS 22620 QB1
A. i and ii
B. i, ii, iii
C. i and iii
A. sends message key using public key encryption using DES and hashed
message using public key encryption
C. the authority checks and assures customers that the public key indeed
belongs to the business which claims its ownership
B. Internet Protocol
94. Which of the following is valid difference between a Virus and a Spyware ?
A. Spyware damages data and also steals sensitive private
information
B. Virus Damages Data, Spyware Steals Sensitive Private
Information
C. Spyware damages data, Virus steals sensitive private information
D. Virus damages data and also steals sensitive private information
100. In which of the following protocols does a website (if accessed using the
protocol) encrypt the session with a Digital Certificate?
A. TCP
B. SHTTP
C. HTTPS
D. XHTTP
C. HTTPS