Css MCQ
Css MCQ
→Telegram Group
COMPUTER SYSTEM SECURITY 2020-21
CO 3
To discover and explain mobile software bugs posing cyber security threats, explain and
recreate exploits, and to explain mitigation techniques
CO 4 To articulate the urgent need for cyber security in critical computer systems, networks, and
world wide web, and to explain various threat scenarios
CO 5 To articulate the well known cyber attack incidents, explain the attack scenarios, and explain
mitigation techniques
DETAILED SYLLABUS
Unit Topic
Computer System Security Introduction: Introduction, What is computer security and what to
learn? , Sample Attacks, The Marketplace for vulnerabilities, Error 404 Hacking digital India
I part 1 chase.
Hijacking & Defense: Control Hijacking ,More Control Hijacking attacks integer overflow
,More Control Hijacking attacks format string vulnerabilities, Defense against Control Hijacking
- Platform Defenses, Defense against Control Hijacking - Run-time Defenses, Advanced
Control Hijacking attacks.
Confidentiality Policies: Confinement Principle ,Detour Unix user IDs process IDs and
II privileges, More on confinement techniques ,System call interposition ,Error 404 digital
Hacking in India part 2 chase , VM based isolation ,Confinement principle ,Software fault
isolation , Rootkits ,Intrusion Detection Systems
Secure architecture principles isolation and leas: Access Control Concepts , Unix and
windows access control summary ,Other issues in access control ,Introduction to browser
III isolation .
Web security landscape : Web security definitions goals and threat models , HTTP content
rendering .Browser isolation .Security interface , Cookies frames and frame busting, Major web
server threats ,Cross site request forgery ,Cross site scripting ,Defenses and protections against
XSS, Finding vulnerabilities ,Secure development.
Basic cryptography: Public key cryptography ,RSA public key crypto ,Digital signature Hash
functions ,Public key distribution ,Real world protocols ,Basic terminologies ,Email security
IV certificates ,Transport Layer security TLS ,IP security , DNS security.
Internet Infrastructure: Basic security problems , Routing security ,DNS revisited ,Summary
V of weaknesses of internet security ,.Link layer connectivity and TCP IP connectivity , Packet
filtering firewall ,Intrusion detection.
1 University Academy
COMPUTER SYSTEM SECURITY 2020-21
2. Unit-II ………………………………………………...….…………......…………17
3. Unit-III……………………………………………….….……..……....…... …….27
4. Unit-IV …………………………..…….…..………….……………….………….42
5. Unit-V ………………………………………….................................……………48
2 University Academy
COMPUTER SYSTEM SECURITY 2020-21
1. Unit-I
1. What was the percentage increase in Zero Day Answer: (d)
Vulnerabilities in the year 2015? 6. Which of the following is considered legal?
a. 4% a. Hacking a social media account and
b. 50% sending a private message
c. 100% b. Hacking a bank account and siphoning
d. 125% funds
Answer: (d) c. Hacking a company’s security system
2. What hacking attacks were mentioned in the with permission from the management
lesson? d. All of the above
a. Hacking in French Election Answer: (c)
b. ATM Hacking in India
c. Denial of Service attack in Turkish Bank 7. What is the cost of launching Denial of Service
d. All of the above attack on a website?
Answer: (d) a. $20/hr
3. Identify the software whose vulnerability is b. $100/day
exploited the most? c. $300/mont
a. Android d. Both A and B
b. Browser Answer: (d)
c. Adobe Flash Player 8. Which of the following is not an advantage of
d. Microsoft Office studying Cyber Security?
Answer: (b) Browser a. It gives you the ability to hack a
computer system
4. The computer vulnerabilities and exploits b. It allows you to know the ways through
databases are maintained by _________. which cyberspace can be breached
a. Kaspersky Lab c. Both A and B
b. Symantec Corporation d. None of the above
c. MITRE Corporation Answer: (d)
d. None of the above
Answer: (c) 9. Which of the following is correct for silent
5. Which of the following is/are correct with banker?
respect to Ransomware? a. It is a trojan horse
a. It is a form of Malware b. It records keystrokes, captures screens
and steals confidential banking
b. It encrypts the whole hard drive of the
credentials and sends them to a remote
computer, essentially locking the user attacker
out of the entire system. c. Both A and B
d. None of the above
c. It locks the system’s screen or locks the
users’ files unless a ransom is paid. Answer: (c) Both A and B
d. All of the above
3 University Academy
COMPUTER SYSTEM SECURITY 2020-21
10. Which of the following is not a part of Security 14. Which of the following is to be done to avoid
System Centric Design? limitations in threat models?
a. Policy a. Making more explicit and formalized
b. Agreement threat models to understand possible
c. Mechanisms weaknesses
d. Threat Models b. Making simpler and more general threat
Answer: (b) models
c. Making less assumptions to design a
11. Which of the following is not a goal in the better threat model
security system design? d. All of the above
a. Vulnerability Answer: (d)
b. Confidentiality 15. The storm botnet was used for ______.
c. Integrity a. Phishing
d. Availability b. Spamming
Answer: (a)
c. Hacking
d. None of the above
12. Which of the following is most important in
Answer(b)
design of secure system?
16. What is a typical cost of launching Denial
a. Assessing vulnerability
b. Changing or Updating System of Service attack on a website?
according to vulnerability a. $20/hr
c. Both A and B b. $100/day
d. None of the above c. $300/month
Answer: (c) d. Both A and B
Answer (d)
13. Which of the following is correct with respect
17. Which of the following is correct for silent
to Penetration testing?
banker?
a. It is an internal inspection of
a. It is a trojan horse
Applications and Operating systems
b. It records keystrokes, captures
for security flaws.
b. It is an authorized simulated cyber- screens and steals confidential
attack on a computer system, banking credentials and sends them
performed to evaluate the security of to a remote attacker
the system c. Both A and B
c. It is hacking a security system of an d. None of the above
organization. Answer(c)
d. All of the above
18. What is Stuxnet?
Answer: (b)
a. A trojan horse
4 University Academy
COMPUTER SYSTEM SECURITY 2020-21
5 University Academy
COMPUTER SYSTEM SECURITY 2020-21
6 University Academy
COMPUTER SYSTEM SECURITY 2020-21
7 University Academy
COMPUTER SYSTEM SECURITY 2020-21
8 University Academy
COMPUTER SYSTEM SECURITY 2020-21
filter or crash the traffic from such sources 56. Which among the following is the least
is known as a _____________ strong security encryption standard?
9 University Academy
COMPUTER SYSTEM SECURITY 2020-21
10 University Academy
COMPUTER SYSTEM SECURITY 2020-21
11 University Academy
COMPUTER SYSTEM SECURITY 2020-21
b. Cyberethics Answer: b
c. Cybersecurity 81. In ethical hacking and cyber security, there
d. Cybersafety are _______ types of scanning:
Answer: b
12 University Academy
COMPUTER SYSTEM SECURITY 2020-21
13 University Academy
COMPUTER SYSTEM SECURITY 2020-21
14 University Academy
COMPUTER SYSTEM SECURITY 2020-21
15 University Academy
COMPUTER SYSTEM SECURITY 2020-21
16 University Academy
COMPUTER SYSTEM SECURITY 2020-21
Unit-II
17 University Academy
COMPUTER SYSTEM SECURITY 2020-21
a. Confidentiality
b. Integrity 13. Compromising confidential information
c. Authenticity comes under _________
d. Availability a. Bug
Answer: c b. Threat
9. Data ___________ is used to ensure c. Vulnerability
confidentiality. d. Attack
a. Encryption Answer: b
b. Locking 14. Which of the following are not security
c. Deleting policies?
d. Backup a. Regulatory
Answer: a b. Advisory
10. Data integrity gets compromised when c. Availability
_____ and _____ are taken control off. d. User Policies
a. Access control, file deletion Answer: c
b. Network, file permission 15. Examples of User Policies is/are:
c. Access control, file permission a. Password Policies
d. Network, system b. Internet Usage
Answer: c c. System Use
11. _______ is the practice and precautions d. All of the above
taken to protect valuable information from
unauthorised access, recording, disclosure 16. _____ Policy ensures that the organization
or destruction. is maintaining
a. Network Security standards set by specific industry regulation.
b. Database Security a. Regulatory
c. Information Security b. Advisory
d. Physical Security c. Availability
Answer: c d. User Policies
12. From the options below, which of them is Answer: a
not a threat to information security? 17. ______ Policy is like standards rules and
a. Disaster regulations set by the management to
b. Eavesdropping advise their employees on their activity or
c. Information leakage behavior
d. Unchanged default password a. Regulatory
Answer: d b. Advisory
18 University Academy
COMPUTER SYSTEM SECURITY 2020-21
19 University Academy
COMPUTER SYSTEM SECURITY 2020-21
20 University Academy
COMPUTER SYSTEM SECURITY 2020-21
21 University Academy
COMPUTER SYSTEM SECURITY 2020-21
22 University Academy
COMPUTER SYSTEM SECURITY 2020-21
Answer :- d
52. If we talk about Return Oriented 55. The below function is part of a program
Programming, which of the following that is running on a 32-bit x86 system; the
statement is true ? compiler does not change the order of
a. It is a computer security exploit variables on the stack.
technique that allows an attacker to void function(char *input) {
execute code in the presence of int i = 1;
security defences such as DEP and char buffer[8];
code signing int j = 2;
b. These types of attacks arise when an strcpy(buffer,input);
adversary manipulates the call stack printf(“%x %x %s\n”,i,j,buffer);
by taking advantage of a bug in the }
program, often a buffer overflow.
c. Return-oriented programming is an What is the minimum length of a string passed
advanced version of a stack smashing to the function through the input parameter
attack. that can crash the application?
d. All of the above a. 10
b. 11
Answer :- d c. 12
d. 13
53. An hardware device's interrupt request Answer:(c)
invokes ____ , which handles this interrupt. 56. Applications developed by programming
languages like ____ and ______ have this
a. Instruction Set Randomization common buffer-overflow error.
b. Information Storage and Retrieval a. C, Ruby
c. Interrupt Service Routine b. C, C++
d. Intermediate Session Routing c. Python, Ruby
d. C, Python
Answer :- c Answer(b)
54. Which of the following is a method of 57. _____________ buffer overflows, which
randomization? are more common among attackers.
a. ASLR a. Memory-based
b. Sys-call randomization b. Queue-based
c. Memory randomization c. Stack-based
d. All of the above. d. Heap-based
23 University Academy
COMPUTER SYSTEM SECURITY 2020-21
24 University Academy
COMPUTER SYSTEM SECURITY 2020-21
67. The behaviour of the _______ is controlled prevention of control hijacking attacks?
by the ________ a. Coverity
a. format function, format string b. Prefix/Prefast
b. format string, format function c. Both A and B
c. Both A and B d. None of the above
d. None of the above Answer(c)
Answer(a)
72. Overflow code execution can be
prevented by:
68. Identify whether the following code has
format string vulnerability or not. char a. halting the process
tmpbuf[512]; snprintf (tmpbuf, sizeof b. fixing bugs
(tmpbuf), “foo: %s”, user); tmpbuf[sizeof c. adding more memory
(tmpbuf) – 1] = ’\0’; syslog d. marking the stack and heap
25 University Academy
COMPUTER SYSTEM SECURITY 2020-21
execute code in the presence of 78. _____ is only applied to images for
security defences such as DEP and which the dynamic-relocation flag is set.
code signing a. ASLR
b. These types of attacks arise when an b. ISR
adversary manipulates the call stack c. Sys-call randomization
by taking advantage of a bug in the d. None of the above
program, often a buffer overflow. Answer(a)
c. Return-oriented programming is an
advanced version of a stack smashing 79. Which of the following mark memory
attack. regions as non-executable, such that an
d. All of the above attempt to execute machine code in these
Answer(d)
regions will cause an exception?
a. ASLR
b. ISR
c. Sys-call randomization
d. Memory randomization
Answer(d)
26 University Academy
COMPUTER SYSTEM SECURITY 2020-21
Unit-III
1. A ______ may at any time be idle, or uid and the saved uid are assigned
to the user ID of the owner of the
have one or more _______ executing on
file
its behalf. c. Both A and B
d. None of the above
a. subject, principals
Answer(d)
b. principal, subjects
c. subject, objects
6. Which of the following is a way to escape
d. principal, objects
Answer(b) jail as root?
27 University Academy
COMPUTER SYSTEM SECURITY 2020-21
29 University Academy
COMPUTER SYSTEM SECURITY 2020-21
a. Enforce minimal privileges for 29. Which of the following permission types a
intended purpose. UNIX file can be assigned?
b. Drop privileges when you no longer a. Read
need them. b. Write
c. Both A and B c. Execute
d. None of the above d. All of the above
Answer:- c
Answer: (d)
26. ______ uses a typical Unix approach with 30. Which of the following information is
a large monolithic server and is known for contained in the access tokens?
the high complexity and previous security a. The security identifier (SID) for the
vulnerabilities. user’s account
b. A list of the privileges held by either
a. Sendmail the user or the user’s groups
b. Qmail c. The SID for the primary group
c. Both A and B d. All of the above
d. None of the above Answer(d)
Answer:- a
31. An access token that has been created to
27. In android process isolation, which process capture the security information of a client
only run as root? process, allowing a server to “impersonate”
a. Zygote the client process in security operations.
b. Ping a. Primary Token
c. Both A and B b. Process Token
d. None of the above c. Personalized Token
Answer:- c d. Impersonation Token
28. Which of the following is not a level of Answer (d)
access control on UNIX systems? 32. Which of the following is not a common
a. User password myth?
b. Administrator a. The best length of password is 8
c. Group characters
d. Other b. Replacing characters with numbers is
Answer (b) good (e.g. J0hn_Sm1th)
c. Passwords can include spaces
30 University Academy
COMPUTER SYSTEM SECURITY 2020-21
31 University Academy
COMPUTER SYSTEM SECURITY 2020-21
32 University Academy
COMPUTER SYSTEM SECURITY 2020-21
33 University Academy
COMPUTER SYSTEM SECURITY 2020-21
58. What is the constraint on the data per 62. SQL injection is an attack in which
cookie? _________ code is inserted into strings that
a. 16 KB are later passed to an instance of SQL
b. 8 KB Server.
c. 4 KB a. malicious
d. 2 KB b. redundant
Answer: c c. clean
59. Which of the following is the maximum d. non malicious
number of cookies that a browser can Answer: a
store? 63. Point out the wrong statement:
a. 10 Cookies / Site a. SQL injection vulnerabilities occur
b. 20 Cookies / Site whenever input is used in the
c. 30 Cookies / Site construction of an SQL query without
d. None of the above being adequately constrained or
Answer: b sanitized
60. Which of the following is a use of cookies? b. SQL injection allows an attacker to
access the SQL servers and execute
a. User Authentication SQL code under the privileges of the
b. Personalization user used to connect to the database
c. User Tracking c. The use of PL-SQL opens the door
d. All of the above to SQL injection vulnerabilities
Answer: d d. None of the mentioned statements is
61. If we set the secure attribute of the cookie wrong
equals to true, then which of the following Answer: c
is correct?
a. The browser will only send cookie 64. A Web site that allows users to enter text,
back over HTTPS such as a comment or a name, and then
b. The browser will only send cookie stores it and later display it to other users, is
back over HTTP potentially vulnerable to a kind of attack
c. The browser will send cookie back called a ___________attack.
over both HTTPS & HTTP a. Two-factor authentication
d. None of the above b. Cross-site request forgery
Answer: d c. Cross-site scripting
d. Cross-site scoring scripting
Answer: b
34 University Academy
COMPUTER SYSTEM SECURITY 2020-21
65. Many applications use ___________ where 69. Attack which forces a user(end user)to
two independent factors are used to identify execute unwanted actions on a web
a user. application in which he/she
a. Two-factor authentication is currently authenticated…
b. Cross-site request forgery a. Cross-site scoring scripting
c. Cross-site scripting b. Cross-site request forgery
d. Cross-site scoring scripting c. Cross-site scripting
Answer: a d. Two-factor authentication
66. Which of the following is a good way to Answer: b
prevent SQL injection? 70. Even with two-factor authentication, users
a. Use parameterized / prepared SQL are vulnerable to which attacks.
b. Use ORM framework a. Man-in-the-middle
c. Both A and B b. Cross attack
d. None of the above c. scripting
Answer: c d. Radiant
67. which attacks, the attacker manage’s to Answer: a
take control of the application to execute an 71. which factor uses in many applications,
SQL query created by the attacker… where two independent factors are used to
a. SQL injection identify a user…
b. Direct a. Cross-site scripting
c. SQL b. Cross-site request forgery
d. Application c. Two-factor authentication
Answer: a d. Cross-site scoring scripting
68. A Web site that allows users to enter text, Answer: c
such as a comment or a name, and then 72. The system that allows the user to be
stores it and laterdisplays it to other users, authenticated once and multiple
is potentially vulnerable to a kind of attack applications can then verify the user’s
what attack is it… identity through an authentication service
a. Cross-site scoring scripting without requiring reauthentication…
b. Cross-site request forgery a. OpenID
c. Cross-site scripting b. Sign-on system
d. Two-factor authentication c. Security Assertion Markup Language
Answer: c d. Virtual Private Database
Answer: b
35 University Academy
COMPUTER SYSTEM SECURITY 2020-21
36 University Academy
COMPUTER SYSTEM SECURITY 2020-21
37 University Academy
COMPUTER SYSTEM SECURITY 2020-21
38 University Academy
COMPUTER SYSTEM SECURITY 2020-21
39 University Academy
COMPUTER SYSTEM SECURITY 2020-21
109. Which of the following is a reason for 113. A Web site that allows users to enter
mounting CSRF attack? text, such as a comment or a name, and
a. Network Connectivity then stores it and later display it to other
b. Read Browser State users, is potentially vulnerable to a kind of
c. Write Browser State attack called a ___________________
d. All of the above attack.
40 University Academy
COMPUTER SYSTEM SECURITY 2020-21
Answer:- d
117. Which of the following is the best way
to prevent malicious input exploiting your
application?
a. Input validation using an allow List
b. Using encryption
41 University Academy
COMPUTER SYSTEM SECURITY 2020-21
Unit-IV
1. Which of the following is false for RSA Answer:- d
algorithm :- 5. Some of cryptography protocols are :-
a. Security of RSA depends on problem of a. SSL
factoring large number b. SET
b. In software, RSA is 100 times slower c. IPSec
than DES d. All of the above
c. In hardware, RSA is 10 times slower Answer:- d
than DES 6. Which of the following is true of
d. RSA can be faster than the symmetric SSL(Secured Socket Layer) :-
algorithm a. Client authentication is compulsary
Answer:-c b. It is developed by Netscape
2. Which of the follwoing is true :- c. Connection is need not be encrypted
a. The receiver can verify signature d. All of the above
using public key Answer:- b
b. Public key is used to encrypt the 7. The OSI model has :-
message a. 8 Layers
c. Message is send without any key b. IP Sec protocol in network layer
d. public key cryptography is symmetric c. SSL protocol in application layer
cryptography d. All of the above
Answer:-a Answer:- b
3. A cryptographic hash functions are : 8. In OSI Model :-
a. Easy to compute a. routing takes place in network layer
b. Used in creating digital fingerprint b. Physical layer transmits and
c. Both 1 and 2 receives unstructured raw data
d. None of the above c. HTTP is application level protocol
Answer:- c d. All of the above
4. In public key distribution :- Answer:- d
a. Public keys are published in a database 9. A public key certificate contains :-
b. Receiver decrypts the message using a. Private and public key of the entity
their private key being certified
c. Sender gets receiver’s public key from b. Digital signature algorithm id
databse c. Identity of the receiver
d. All of the above d. Both 1 and 2
42 University Academy
COMPUTER SYSTEM SECURITY 2020-21
43 University Academy
COMPUTER SYSTEM SECURITY 2020-21
44 University Academy
COMPUTER SYSTEM SECURITY 2020-21
29. Data Encryption Standard (DES), was 33. In symmetric-key cryptography both
designed by party used
a. intel a. same keys
b. IBM b. multi keys
c. HP c. different keys
d. Sony d. two keys
Answer :b Answer a
34. In symmetric-key cryptography, the key
30. In Asymmetric-key Cryptography, locks and unlocks the box is
although Rivest, Shamir, and Adelman a. same
(RSA) can be used to encrypt and decrypt b. shared
actual messages, it is very slow if the c. private
message is d. public
a. short Answer a
b. long 35. The keys used in cryptography are
c. flat a. secret key
d. thin b. private key
Answer b c. public key
d. different key
31. In symmetric-key cryptography, the key Answer d
used by the sender and the receiver is 36. Data Encryption Standard (DES) is an
a. shared example of
b. different a. complex block cipher
c. two keys are used b. cryptography
d. same keys are used c. Electronic Cipher Book
Answer a d. Electronic Code Book
32. In Rotation Cipher, keyless rotation the Answer a
number of rotations is 37. The relationship between a character in
a. jammed the plaintext to a character is
b. idle a. many-to-one relationship
c. rotating b. one-to-many relationship
d. fixed c. many-to-many relationship
Answer d d. one-to-one relationship
Answer b
45 University Academy
COMPUTER SYSTEM SECURITY 2020-21
46 University Academy
COMPUTER SYSTEM SECURITY 2020-21
47 University Academy
COMPUTER SYSTEM SECURITY 2020-21
Unit-V
c. Network
1. In TCP, sending and receiving data is d. Presentation
done as Answer:- d
a. Stream of bytes 6. _____ is a library for formatting raw
b. Sequence of characters packets with arbitrary IP headers.
c. Lines of data a. Libnet
d. Packets b. HeadLib
Answer:- b c. IPLib
2. TCP groups a number of bytes together d. None of the above
into a packet called Answer:- a
a. Packet 7. Which of the following is correct for
b. Buffer Transmission Control Protocol?
c. Segment a. Connection Oriented
d. Stack b. Preserves order
Answer:- c c. Both A and B
d. None of the above
3. Which of these is not applicable for IP Answer:- c
protocol?
a. Is connectionless 8. Which of the following is a basic security
b. Offer reliable service problem?
c. Offer unreliable service a. Network packets pass by
d. None of the mentioned untrusted hosts
Answer:- b b. TCP state easily obtained by
4. Which of the following is a function of IP eavesdropping
Protocol? c. Denial of service vulnerabilities
a. Error reporting d. All of the above
b. Fragmentation and Reassembly Answer:- d
c. Routing 9. Which protocol ensures reliable delivery?
d. All of the above a. TCP
Answer:- d b. UDP
5. Which of the following is not a layer of c. Both A and B
TCP protocol stack? d. None of the above
a. Application Answer:- a
b. Transport
48 University Academy
COMPUTER SYSTEM SECURITY 2020-21
d. Non-distance vector
10. Which protocol uses window flow
system? Answer:- b
a. UDP 15. In OSPF, a ……… link is a network with
b. TCP several routers attached to it.
c. FTP a. Point-to-point
d. None of the above b. Transient
Answer:- b c. Stub
11. Which of the following is not a routing d. Multipoint
protocol? Answer:- b
a. OSPF 16. Which of the following are the solutions
b. BGP to network security?
c. ARP i) Encryption ii) Authentication
d. MGP iii) Authorization iv) Non-repudiation
Answer:- d a. i, ii and iii only
12. What is full form of ARP? b. ii, iii and iv only
a. Address Resolution Protocol c. i, iii and iv only
b. Allied Resolution Protocol d. All i, ii, iii and iv
c. Address Resolution Process Answer:- d
d. Address Rectification Protocol 17. …………… is to protect data and
Answer:- a passwords.
13. ROA stands for – a. Encryption
a. Route Organization b. Authentication
Administration c. Authorization
b. Route Organization d. Non-repudiation
Authorization Answer:- a
c. Rules of Authorization 18. The following protocols and systems are
d. Rules of Administration commonly used to provide various
Answer:- b degrees of security services in a computer
14. The Open Shortest Path First (OSPF) network.
protocol is an intra domain routing i) IP filtering
protocol based on ________ routing. ii) Reverse Address Translation
a. Distance vector iii) IP Security Architecture (IPsec)
b. Link state iv) Firewalls
c. Path vector v) Socks
49 University Academy
COMPUTER SYSTEM SECURITY 2020-21
50 University Academy
COMPUTER SYSTEM SECURITY 2020-21
51 University Academy
COMPUTER SYSTEM SECURITY 2020-21
34. In packet-filtering router, the following 38. Network layer firewall works as a
information can be external from the ________
packet header. a. frame filter
i) Source IP address b. packet filter
ii) Destination IP address c. signal filter
iii) TCP/UDP source port d. content filter
iv) ICMP message type Answer: b
v) TCP/UDP destination port 39. Network layer firewall has two sub-
a. i, ii, iii and iv only categories called ____________
b. i, iii, iv and v only a. stateful firewall and stateless firewall
c. ii, iii, iv and v only b. bit oriented firewall and byte oriented
d. All i, ii, iii, iv and v firewall
Answer:- d c. frame firewall and packet firewall
35. . …………….. mode is used whenever d. network firewall and data firewall
either end of a security association is Answer: a
gateway. 40. WPA2 is used for security in _______
a. Tunnel a. ethernet
b. Encapsulating b. bluetooth
c. Transport c. wi-fi
d. Gateway d. e-mail
Answer:- a
36. IPSec is designed to provide security at Answer: c
the _________ 41. An attempt to make a computer resource
a. transport layer unavailable to its intended users is called
b. network layer ______
c. application layer a. denial-of-service attack
d. session layer b. virus attack
Answer: b c. worms attack
37. In tunnel mode, IPSec protects the d. botnet process
______ Answer: a
a. Entire IP packet 42. Extensible authentication protocol is
b. IP header authentication framework frequently used
c. IP payload in ______
d. IP trailer a. wired personal area network
Answer: a b. wireless networks
52 University Academy
COMPUTER SYSTEM SECURITY 2020-21
45. When a DNS server accepts and uses 49. Which of the following is / are the types
incorrect information from a host that has of firewall?
no authority giving that information, then a. Packet Filtering Firewall
it is called _________ b. Dual Homed Gateway Firewall
a. DNS lookup c. Screen Host Firewall
b. DNS hijacking d. Dual Host Firewall
c. DNS spoofing Answer: a
d. DNS authorizing 50. A proxy firewall filters at _________
Answer: c a. Physical layer
46. Network layer firewall works as a b. Data link layer
__________ c. Network layer
a. Frame filter d. Application layer
b. Packet filter Answer: d
c. Content filter
d. Virus filter
53 University Academy
→Telegram Channel
→Telegram Group