0% found this document useful (0 votes)
52 views

Module 5: Multiple-Choice Questions

This document contains 17 multiple choice questions about various topics related to information security including: forms of mobile passcode attacks; examples of physical authentication devices; types of biometrics; principles of information security; network attacks; phishing techniques; intrusion detection methods; firewalls; and encryption methods like public key cryptography and RSA. The questions are designed to test knowledge on these topics in information security.

Uploaded by

naaz_pinu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views

Module 5: Multiple-Choice Questions

This document contains 17 multiple choice questions about various topics related to information security including: forms of mobile passcode attacks; examples of physical authentication devices; types of biometrics; principles of information security; network attacks; phishing techniques; intrusion detection methods; firewalls; and encryption methods like public key cryptography and RSA. The questions are designed to test knowledge on these topics in information security.

Uploaded by

naaz_pinu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Module 5: Multiple-choice questions:

1. Which of the following are forms of attacks on mobile passcode:


a) Smudge attacks
b) Shoulder-surfing attacks
c) Advanced attacks
d) All of the above
2. All of the following are forms of attacks on mobile passcode, except for:
a) Smudge attacks
b) Shoulder-surfing attacks
c) Facilitated attacks
d) Advanced attacks
3. All of the following are examples of physical devices used to authenticate users, except for:
a) RFID
b) Smart cards
c) eToken
d) smart hub
4. Which of the following are examples of groups of biometrics:
a) Physical biometrics
b) Behavioral biometrics
c) All of the above
d) None of the above
5. All of the following are examples of physical biometrics, except for:
a) Hand geometry
b) Retina
c) Voice
d) DNA
6. All of the following are examples of behavioral biometrics, except for:
a) Gait
b) Keystroke
c) Voice
d) DNA
7. All of the following questions pertain to the 2-factor authentication, except for:
a) Something you are
b) Something you have
c) Something you know
d) Something you think
8. All of the following are principles of information security except for:
a) Confidentiality
b) Communication
c) Availability
d) Integrity
9. Threats to information security include:
a) Intercepted data transfers
b) Physical loss of data
c) Unauthorized access to physical records
d) All of the above
10. All of the following are true for public key cryptography except for:
a) It includes a public-key
b) It includes a private-key
c) It represents a symmetric encryption
d) Those who encrypt messages or verify signatures cannot decrypt messages or create signatures
11. All of the following are approaches to attach RSA security, except for:
a) Targeted attacks
b) Mathematical attacks
c) Timing attacks
d) Brute force key search
12. Methods of DoS attacks include all of the following, except for:
a) Ping of death
b) Browser crashing
c) TCP-SYN flood
d) All of the above are methods of DoS attacks
13. Among the most common types of network attacks are all of the following, except for:
a) Browser attacks
b) Brute force
c) Denial of service
d) PCL
14. All of the following are phishing techniques, except for:
a) Whaling
b) Triggering
c) Clone phishing
d) Spear phishing
15. Intrusion detection methods include:
a) Signature-based methods
b) Anomaly-based methods
c) All of the above
d) None of the above
16. All of the following regarding firewalls are true, except for:
a) It sits between two networks
b) Is used to protect one from the other
c) Places a bottleneck between the networks
d) Some communications must pass through the bottleneck
17. All of the following are protection methods that firewall uses, except for:
a) Proxy services
b) Packet filtering
c) IP masquerading
d) All of the answers are protection methods that firewall uses

You might also like