0% found this document useful (0 votes)
332 views7 pages

MCQ Question Bank-IS-1

This document contains a question bank with 40 multiple choice questions related to information security, network security, authentication, encryption, and competitive intelligence gathering. The questions cover topics such as common security threats, file permissions, authentication methods, characteristics of authorization, password policies, types of attacks, encryption standards and algorithms, public key cryptography, and competitive intelligence processes. An answer key is provided at the end listing the correct response for each question.

Uploaded by

Narender Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
332 views7 pages

MCQ Question Bank-IS-1

This document contains a question bank with 40 multiple choice questions related to information security, network security, authentication, encryption, and competitive intelligence gathering. The questions cover topics such as common security threats, file permissions, authentication methods, characteristics of authorization, password policies, types of attacks, encryption standards and algorithms, public key cryptography, and competitive intelligence processes. An answer key is provided at the end listing the correct response for each question.

Uploaded by

Narender Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

UNIT 1 MCQ QUESTION BANK

1. _______ is the practice and precautions taken to protect valuable information from unauthorised
access, recording, disclosure or destruction.
a) Network Security
b) Database Security
c) Information Security
d) Physical Security

2. Which of the following information security technology is used for avoiding browser-based
hacking?
a) Anti-malware in browsers
b) Remote browser access
c) Adware remover in browsers
d) Incognito mode in a browser

3. Lack of access control policy is a _____________


a) Bug
b) Threat
c) Vulnerability
d) Attack

4. Possible threat to any information cannot be ________________


a) reduced
b) transferred
c) protected
d) ignored

5. What are the common security threats?


a) File Shredding
b) File sharing and permission
c) File corrupting
d) File integrity

6. From the following, which is not a common file permission?


a) Write
b) Execute
c) Stop
d) Read

7. Which of the following is the least secure method of authentication?


a) Key card
b) fingerprint
c) retina pattern
d) Password

8. Why is one-time password safe?


a) It is easy to generated
b) It cannot be shared
c) It is different for every access
d) It is a complex encrypted password

9. Which happens first authorization or authentication?


a) Authorization
b) Authentication
c) Authorization & Authentication are same
d) None of the mentioned

10. What are the characteristics of Authorization?


a) RADIUS and RSA
b) 3 way handshaking with syn and fin
c) Multi-layered protection for securing resources
d) Deals with privileges and rights

11. What is not a best practice for password policy?


a) Deciding maximum age of password
b) Restriction on password reuse and history
c) Password encryption
d) Having change password every 2 years

12. What is breach of confidentiality?


a) This type of violation involves unauthorized reading of data
b) This violation involves unauthorized modification of data
c) This violation involves unauthorized destruction of data
d) This violation involves unauthorized use of resources

13. What is theft of service?


a) This type of violation involves unauthorized reading of data
b) This violation involves unauthorized modification of data
c) This violation involves unauthorized destruction of data
d) This violation involves unauthorized use of resources

14. What is Trojan horse?


a) It is a useful way to encrypt password
b) It is a user which steals valuable information
c) It is a rogue program which tricks users
d) It’s a brute force attack algorithm

15. Which of the following is not a characteristic of a virus?


a) Virus destroy and modify user data
b) Virus is a standalone program
c) Virus is a code embedded in a legitimate program
d) Virus cannot be detected

16. What is known as a DOS attack?


a) It is attacked to block traffic of network
b) It is attacked to harm contents stored in HDD by worm spawn processes
c) It is an attempt to make a machine or network resource unavailable
d) None of the mentioned

17. What is are two safe computing practices?


a) Not to open software from unknown vendors
b) Open and execute programs in admin level/root
c) Open and execute programs in presence of antivirus
d) None of the mentioned

18. What is the preferred way of encryption?


a) pre shared secret key
b) using key distribution center (KDC)
c) public key-encryption
d) symmetric key

19. What is not a role of encryption?


a) It is used to protect data from unauthorized access during transmission
b) It is used to ensure user authentication
c) It is used to ensure data integrity
d) It is used to ensure data corruption doesn’t happens

20. What is not an encryption standard?


a) AES
b) TES
c) Triple DES
d) DES

--------------

21. An algorithm in encryption is called _____________


a) Algorithm
b) Procedure
c) Cipher
d) Module

22. The information that gets transformed in encryption is ____________


a) Plain text
b) Parallel text
c) Encrypted text
d) Decrypted text

23. Which of these is a part of network identification?


a) UserID
b) Password
c) OTP
d) fingerprint
24. Network Security provides authentication and access control for resources.
a) True
b) False

25. WTLS stands for?

a) Wireless Transfer System Layer


b) Wireless Transport Security Layer
c) Wireless Transfer Security Layer
d) Wireless Transport System Layer

26. An attack in which the site is not capable of answering valid request.
a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm

27. An indirect form of surveillance.


a) Honey pot
b) Logical
c) Security
d) Intrusion

28. In public key cryptography, a key that decrypts the message.


a) public key
b) unique key
c) private key
d) security key

29. Encryption standard that is selected by the US government to replace DES.


a) AES
b) BES
c) CES
d) DES

30. An electronic document that establishes your credentials when you are performing transactions.
a) Digital code
b) OTP
c) E-mail
d) Digital certificate

31. An encryption technique with 2 keys is ______________


a) Monoalphabetic Cipher
b) Cryptography
c) Private key cryptography
d) Public key cryptography

32 . ____________ is the term used for gathering information about your competitors from online
resources, researches, and newsgroups.
a) Competitive Intelligence gathering
b) Cognitive Intelligence gathering
c) Cyber Intelligence gathering
d) Competitors Info gathering

33. In the world of data, where data is considered the oil and fuel of modern technology
_____________ is both a product and a process.
a) Competitive Intelligence gathering
b) Cognitive Intelligence gathering
c) Cyber Intelligence gathering
d) Competitors Info gathering

34. Which of them is not a proper step in competitive intelligence data processing?
a) Data gathering
b) Data analysis
c) Information security
d) Network analysis

35. ______________ is important to grab a quick understanding and analyzing about your
competitors or target user’s need.
a) Competitive Intelligence gathering
b) Cognitive Intelligence gathering
c) Cyber Intelligence gathering
d) Competitors Info gathering

36. Predict and analyze the tactics of competitors from data taken out from online data sources is a
crime.
a) True
b) False

37. Using _____________ for doing competitive information gathering is a crime.


a) Spyware
b) Antivirus
c) Anti-malware
d) Adware

38. The ______________ intelligence gathering is non-interfering & subtle in nature.


a) cognitive
b) competitive
c) cyber
d) concrete

39. ____________ is the term used for gathering information about your competitors from online
resources, researches, and newsgroups.
a) Competitive Intelligence gathering
b) Cognitive Intelligence gathering
c) Cyber Intelligence gathering
d) Competitors Info gathering
40. Which two of the following are authentication algorithms?
a) MAC
b) AES
c) DAS
d) Digital-signature

ANSWERS

1. C 32. A
2. B 33. A
3. B 34. D
4. C 35. A
5. D 36. B
6. B 37. A
7. C 38. B
8. D 39. A
9. C 40. A
10. A
11. D
12. D
13. A
14. D
15. C
16. D
17. C
18. A
19. C
20. D
21. B
22. C
23. A
24. A
25. A
26. B
27. B
28. A
29. C
30. A
31. D

You might also like