Sic MCQ
Sic MCQ
UNIT 1
⚫ Defence
◯ Detection
◯ Detterence
⚫ Defence ,Detection,Deterrence
⚫ Onion
◯ Lolipop
◯ Both
4. _____ is a standalone computer program that replicate itself in order to spread itself. (1 point)
⚫ Worms
◯ Trojans
◯ Virus
◯ Data of security
⚫ Denial of service
◯ Denial on service
6. ________ means that the data has not been altered in an unauthorized way (1 point)
◯ Confidentiality
⚫ Integrity
◯ Availability
7. ________attack attempts to learn or make use of information from the system but does
(1 point)
◯ Active Attack
⚫ passive attack
◯ User
8. ___________ is a measure how easily data and software can be transferred from one
(1 point)
◯ Carriers
◯ Transport
⚫ Portability
concealed
(1 point)
⚫ Detection
◯ Detterence
◯ Defence
10. _______is a path or tool used by the hacker to attack the sysytem (1 point)
◯ Threat
⚫ Threat Vector
◯ User
11. ________ means that only the authorized individual or system can view sensitive
information
(1 point)
⚫ Confidentiality
◯ Integrity
◯ Availability
◯ Onion
⚫ Lolipop
◯ Both
13. ________refers to the ability of the organization that allows it to respond rapidly to the
(1 point)
⚫ Business Agility
◯ Portability
◯ Cost Reduction
◯ Security Methodology
14. _______is a malware that is disguised as legitimate software and which can be used to
(1 point)
◯ Worms
⚫ Trojan
◯ Virus
◯ Worms
◯ Trojans
⚫ Virus
16. ________attack attempts to modify the system resources or affect their operations (1 point)
⚫ Active Attack
◯ passive attack
◯ User
◯ 40
⚫ 32
◯ 48
(1 point)
◯ Detection
⚫ Detterence
◯ Defence
◯ Employees
⚫ Information
◯ Salary
UNIT 2
1. The process of converting encrypted form of text back to its original form is called (1 point)
◯ Encryption
⚫ Decryption
◯ Cryptosystem
(1 point)
◯ Authentication
⚫ Authorization
⚫ Authentication
◯ Authorization
◯ MFA
◯ SFA
⚫ Authentication
◯ Authorization
◯ Both the above
◯ Authentication
⚫ Authorization
8. ________ cryptography uses the same key for encryption and decryption (1 point)
◯ PKI
9. In ________cryptography system the key is shared to receiver before data transform (1 point)
◯ PKI
◯ Authentication
⚫ Authorization
◯ MFA
◯ SFA
12. ________ cryptography uses the different key for encryption and decryption (1 point)
◯ PKI
point) ◯ Conversion
⚫ Encryption
◯ Decryption
⚫ Authentication
◯ Authorization
◯ Encryption
◯ Decryption
⚫ Cipher text
point) ⚫ Authentication
◯ Authorization
⚫ Authentication
◯ Authorization
⚫ Public
◯ Both
point) ◯ Authentication
⚫ Authorization
⚫ Authentication
◯ Authorization
point) ⚫ Authentication
◯ Authorization
◯ Identification
◯ Authentication
⚫ Authorization
◯ MFA
⚫ SFA
27. System used for encryption and decryption is known as_______ (1 point)
◯ Transformation
⚫ Cryptosystem
21. ___________ comparers the desired state of security program with the actual current
(1 point)
◯ Risk Analysis
⚫ Gap Analysis
◯ Both
22. _________is an attack where an application inject a specially crafted packet on to the
network repeatedly
(1 point)
◯ ARP Posoning
⚫ MAC Flooding
◯ DHCP poisoning
23. The act of capturing data packets across the computer network by an unauthorized
third party destined for computers other than their own is called _________ (1 point)
◯ Attack
⚫ Packet sniffing
◯ Theft
◯ None of the above
◯ Government model
⚫ Academic model
25. ________ means that the dat a should be available as an when needed (1
point) ◯ Confidentiality
◯ Integrity
⚫ Availability
UNIT 3
1. _________device forward the packet received at one port to all other port without
storing
(1 point)
◯ Switch
◯ Router
⚫ Hub
⚫ Network
◯ Transport layer
3. _______ is also private network controlled by organization and can be used for providing
customers
(1 point)
◯ Internet
◯ Intranet
⚫ Extranet
4. It is possible to prevent direct connection between external and internal users via
______
(1 point)
◯ Firewall
⚫ Proxy services
◯ ACL
5. ______ is a hardware, software or combination of both that monitors and filters the
(1 point)
⚫ Firewall
◯ IPS
◯ ACL
◯ 48
⚫ 128
◯ 16
7. To send traffic ,sending device must have destination device _______ address (1 point)
◯ IP address
◯ MAC
8. ________layer is concern with the syntax and symantics of the information (1 point)
◯ Application layer
⚫ Presentation layer
◯ Session layer
⚫ Patches
◯ Protocol
◯ Standard
10. In Cisco H. Model _________layer aggregates traffic from all nodes and uplinks from
(1 point)
◯ Access layer
◯ Core layer
⚫ Distribution layer
11. ________layer is responsible for delivery of message from one process to other (1 point)
◯ Physical layer
⚫ Transport layer
12. _______ is a private network of an organization which is accessible only to the members
of the organization
(1 point)
◯ Internet
⚫ Intranet
◯ Extranet
13. _______ provide the mechanism to reporting TCP/IP communication problems (1 point)
◯ ARP
◯ RARP
⚫ ICMP
14. MAC addresses are ____ bit hexadecimal colon separated numbers assigned to NIC by
the manufacturer
(1 point)
⚫ 48
◯ 32
◯ 16
15. High availability ,security, quality of service and IP multicasting are the features of
________layer
(1 point)
⚫ Access layer
◯ Core layer
◯ Distribution layer
16. An acceptable level of information systems risk depends on the individual organization
(1 point)
⚫ True
◯ False
◯ Switch
⚫ Router
◯ Hub
18. ________device forward the received packet to only one port for its correct destination (1 point)
⚫ Switch
◯ Router
◯ Hub
19. In Cisco H. Model _________layer forms the network backbone and it is focused on
(1 point)
◯ Access layer
⚫ Core layer
◯ Distribution layer
20. ______ is a hardware, software or combination of both that monitors and filters the
(1 point)
⚫ Firewall
◯ IPS
◯ ACL
UNIT 4
◯ Voice Internet
◯ VIP
⚫ VoIP
(1 point)
◯ SIDS
◯ NIDS
⚫ HIDS
⚫ SIDS
◯ NIDS
◯ HIDS
(1 point)
⚫ Type A
◯ Type B
◯ Type C
6. ___________method of detection uses signatures ,which are attack patterns that are
preconfigured and predetermined
(1 point)
enterprise users on local lines while allowing all users to share certain no. of external
phone lines
(1 point)
⚫ PBX
(1 point)
◯ SIDS
⚫ NIDS
◯ HIDS
13. As per U.S Department of users trusted computer systems evaluation criteria there are
(1 point)
◯1
◯3
⚫4
strategy for software security that is tailored to the specific risk facing the organizations
(1 point)
⚫ SAMM
◯ PBX
◯ VOiP
18. ___________is a term used to define an approach to managing all telephone service
(1 point)
⚫ TEM
◯ PBX
◯ VOiP
20. _________attack is an attempt to make a system inaccessible to its legitimate users (1 point)
◯ passive attack
⚫ DDoS
◯ Active attack
UNIT 5
1. _______ virtual machine support the host computers physical resources between
multiple virtual machines,each running with its own copy of the operating system (1
point)
2. ______ phase if SDL consist of activities that occur prior to writing code (1
point) ◯ Requirment
⚫ Design
◯ Coding
the Internet
(1 point)
◯ virtual machine
⚫ Cloud computing
⚫ False
5. Two tier thick client application uses user computer and ________ (1 point)
◯ Local computer
⚫ Server
◯ Database
6. _______of the following service provides companies with computing resources including
(1 point)
⚫ IaaS
◯ SaaS
◯ PaaS
8. Three tier thick client application uses user computer ,application server and _______ (1 point)
◯ Local computer
◯ Remote Computer
⚫ Database
Software as a service
⚫ True
◯ False
11. Depending on use and level of dependencies virtual machines can be devided into
________ categories
(1 point)
◯1
⚫2
◯3
12. _______of the following service provides a cloud based environment with everything
required to support the complete life cycle of building and delivering cloud based
application without the cost and complexity of buying and managing the underlying
(1 point)
◯ IaaS
◯ SaaS
⚫ PaaS
that makes the information of the underlying hardware or OS and allows program
(1 point)
Platform as a service
◯ True
⚫ False
16. ________ clients are heavy applications which involve normally the installation of
(1 point)
⚫ thick client
◯ thin client
◯ None of the above
Infrastructure as a service
◯ Nested Computer
◯ Computer in Computer
19. _______ client applications are web based applications which can be accessed on the
(1 point)
◯ thick client
⚫ thin client
21. ________ is a computer file typically called an image,which behave like an actual
computer
(1 point)
⚫ Virtual Machine
◯ computer image
◯ Computer in Computer
⚫ True
◯ False
Security in Computing
Unit 1
a) Employees
b) Resources
c) Information
d) Money
Ans: Information
2. Confidential information is available to external audiences only for business-related purposes and
only after entering
3. Originally, the academic security model was and the government security model was .
4. A approach doesn’t work when you need to allow thousands or millions of people to have access to
a) closed-door
b) open-door
c) wide-door
d) locked-door
5. An approach doesn’t work when you need to protect the privacy of each individual who interacts with
a) closed-door
b) open-door
c) wide-door
d) locked-door
Ans: open-door
6. As more companies started doing business on the Internet, concepts such as were developed
a) Software-as-a-Service (SaaS)
7. What can result in service outages during which customers cannot make purchases and the company
cannot transact
business?
a) virus outbreak
8. means that software and data can be used on multiple platforms or can be transferred/transmitted
a) Portability
b) Accessibility
c) Authority
d) Sharing
Ans: Portability
9. is concerned with protecting information in all its forms, whether written, spoken, electronic,
a) Software Security
b) Information Security
c) Network Security
d) Storage Security
10. is concerned with protecting data, hardware, and software on a computer network.
a) Software Security
b) Information Security
c) Network Security
d) Storage Security
12. Without adequate a security breach may go unnoticed for hours, days, or even forever.
a) Detection
b) Deterrence
c) Defense
Ans: Detection
b) Security framework
c) Planning
d) Security initiatives
15. A security program defines the purpose, scope, and responsibilities of the security organization and
a) Charter
b) Memo
c) Document
d) File
Ans: Charter
a) Security program
b) Security framework
c) Security policy
d) Security initiatives
17. change with each version of software and hardware, as features are added and functionality
changes,
a) Standards
b) Rules
c) Application
d) Files
Ans: Standards
18. Guidelines for the use of software, computer systems, and networks should be clearly documented
for the sake of
b) Rules
c) Guidelines
d) Security
Ans: Guidelines
a) Risk Analysis
b) Planning
c) Guidelines
d) Security
20. compares the desired state of the security program with the actual current state and identifies the
differences.
a) Risk Analysis
b) Security Analysis
c) Comparison Analysis
d) Gap Analysis
21. is a plan of action for how to implement the security remediation plans.
a) Charter
b) Outline
c) Roadmap
d) Layout
Ans: Roadmap
22. The documents how security technologies are implemented, at a relatively high level.
a) Charter
b) Security architecture
c) Roadmap
d) Layout
Ans: security architecture
23. The actions that should be taken when a security event occurs are defined in? the incident response
plan.
a) Charter
b) Security architecture
c) Roadmap
24. is the process of defense, is the process of insurance, and is deciding that the risk
25. is a term used to describe where a threat originates and the path it takes to reach a target.
a) Threat vector
b) Origin vector
c) Target vector
d) Trojan vector
26. refers to a Trojan program planted by an unsuspecting employee who runs a program provided by a
trusted friend from a storage device like a disk or USB stick, that plants a back door inside the network.
a) Threat exploit
b) Friend exploit
c) Girlfriend exploit
d) Trusted exploit
27. Which are the generally recognized variants of malicious mobile code?
a) Viruses
b) Worms
c) Trojans
d) a and b
e) a, b and c
Ans: a, b and c
28. is a self-replicating program that uses other host files or code to replicate.
a) Virus
b) Worm
c) Trojan
Ans: Virus
29. If the virus executes, does its damage, and terminates until the next time it is executed, it is known
as?
a) Temporary virus
b) Resident virus
c) Nonresident virus
d) Stealth virus
a) Permanent virus
b) Memory-resident virus
31. Which viruses insert themselves as part of the operating system or application and can manipulate
any file that is
a) Permanent viruses
b) Memory-resident viruses
32. If the virus overwrites the host code with its own code, effectively destroying much of the original
contents, it is
called?
a) Overwriting virus
b) Stealth virus
c) Nonresident virus
d) Parasitic virus
33. If the virus inserts itself into the host code, moving the original code around so the host
programming still remains
a) Overwriting virus
b) Stealth virus
c) Prepending virus
d) Parasitic virus
34. Viruses that copy themselves to the beginning of the file are called? prepending viruses
a) Overwriting virus
b) Appending virus
c) Prepending virus
d) Parasitic virus
a) Overwriting virus
b) Appending virus
c) Prepending virus
d) Parasitic virus
36. Viruses appearing in the middle of a host file are labeled? mid-infecting viruses.
a) Mid-infecting viruses
b) Appending viruses
c) Prepending viruses
d) Parasitic viruses
37. Who works by posing as legitimate programs that are activated by an unsuspecting user?
a) Virus
b) Worm
c) Trojan
Ans: Trojan
38. Which type of Trojans infect a host and wait for their originating attacker’s commands telling them
b) Zombie Trojans
40. refers to the restriction of access to data only to those who are authorized to use it.
a) Confidentiality
b) Authority
c) Accessibility
Ans: Confidentiality
a) Perimeter Security
b) Defense in depth
1) What control can be used to help mitigate identified risks to acceptable levels?
a. Authentication b. Authorization c. Decryption d. Management
Ans: Authentication
3) Which technologies may be considered by the design team to prevent one application from
consuming too much of bandwidth?
b. Software-as-a-Service(SaaS)
d. Quality of Service(QoS)
Ans: Three
5) What is Core layer’s primary focus?
Access layer b. Core layer c. Distribution layer d. Firewall Ans: Access layer
7) Which architecturing approach offers higher performance and lower cost but also brings special
security considerations into play.
8) What helps us to understand how to use routers and switches to increase the security of the
network?
d. Firewalls
Ans: TCP/IP
10) MAC addresses are ____ bit hexadecimal numbers that are uniquely assigned to each
hardware network interface by the manufacturer.
a. 8 b. 24 c. 48 d. 64
Ans: 48
a. 8 b. 32 c. 64 d. 128
Ans: 32
a. 128 b. 32 c. 24 d. 64
Ans: 128
13) The host uses the ________ , which functions by sending a broadcast message to the network that
basically says, “ Who has 192.168.2.10, tell 192.168.2.15”.
Ans: seven
15) ______ an OSI-model layer is used to convert application data into acceptable and compatible
formats for transmission. At this layer, data is encrypted and encoded and encrypted.
Ans: Presentation
Ans: HTTP
17) Which layer provides mechanism for two host to maintain network connections . a.
Data-link layer b. Session layer c. Physical layer d. Transport layer Ans: Session layer
18) Which layer provides unique address to every host on the network . a.
Application layer b. Physical layer c. Transport layer d. Network layer Ans: Network
layer
19) _____ layer is composed of two sub layers : Media Access Control (MAC) and Logical Link
Control (LLC).
Ans: Data-link
20) As the size of the network increases, the distance and time a packet is in transmit over the
network also ________ , making collision more likely.
Increases
21) Routers and switches operate at layers ___ and ___ respectively.
a. Two and three b. Three and Two c. One and Two d. Three and Four. Ans: Three
and Two
22) In which two ways routers learn the locations of various networks ? a.
b. Network Modelling
d. Patching
Ans: Patching
25) What can be configured to permit or deny TCP, UDP, or other types of traffic based on the source or
the destination address.
c. Patching
26) Which one of the following comes under Disabling Unused Services?
b. Administrative Practises
c. Proxy ARP
d. Patching
Ans: Proxy ARP
27) _______ provides a mechanism for reporting TCP/IP communication problems, as well as utilities
for testing IP layer connectivity.
28) Whose function is to screen network traffic for the purpose of preventing unauthorized access
between computer networks?
a. Firewalls
b. Network Analysis
c. Documentation
Ans: Firewall
29) Different types of software administrators are concerned about that could violate security policies.
b. Web mail
c. Remote access
a. Remote Access
b. Application Awareness
c. a & b both
32) What is the mask for IP address 192.168.0.0 as per Private Addresses specified in RFC1918?
a. 255.0.0.0
b. 255.240.0.0
c. 255.255.0.0
Ans: 255.255.0.0
33) In which of the following way Modern Firewalls assist other areas of network quality and
performance?
c. a & b both
b. Firewall cannot enforce security policies that are absent or undefined. c. Firewalls
a. Network layer
b. Physical layer
d. Transport layer
a. Battery operated
b. War driving
c. Evil Twin
a. War chalking
b. WEP cracking
c. both a&b
40) Which of the following is/are fundamental component(s) of Wireless Intrusion Prevention System.
a. Sensors
b. Management Servers
c. Database server
Ans: NIDS
2) Which of the following is/are Intrusion Detection (ID) system when it checks files and disks for
known malware?
a. Firewalls b. Antivirus c. Both a & b d. None of the above
Ans: Patching
4) _____ is an independent platform that identifies intrusions by examining network traffic and
monitors multiple hosts.
a. Stack-Based Intrusion Detection System (SIDS)
b. Network Intrusion Decision System (NIDS)
c. Host-Based Intrusion Detection System (SIDS)
d. None of the above
5) ______ identifies intrusion by analyzing system calls, application logs, file-system modifications
and other host activities.
a. Host-Based Intrusion Detection System (HIDS)
b. Stack-Based Intrusion Detection System (SIDS)
c. Network Intrusion Decision System (NIDS)
d. All of the above
Ans: Host-Based Intrusion Detection System (HIDS)
10) Which of the following is true for Intrusion Detection System (IPS)?
a. They are placed in-line
b. They are able to actively block intrusions that are detected
c. Takes actions such as sending an alarm, dropping the malicious packets, etc.
d. All of the above
11) _____ is an approach to security management that combines SIM (Security Information
Management) and SEM (Security Event Management).
a. SIEM
b. SOAR
c. UEBA
d. None of the above
Ans: SIEM
12) Which of the following is the most important feature to review when evaluating SIEM products?
a. Testing
b. Threat Intelligence feeds
c. Aggregation
d. All of the above
16) _____ switches calls between enterprises users on local lines while allowing all users to share
certain number of external phone lines.
a. POT
b. PBX
c. TEM
d. All of the above
Ans: PBX
18) Which of the following defines Microsoft’s Trust worthy computing technique?
a. Memory curtaining
b. Remote attestation
c. Sealed storage
d. All of the above
Ans: BIOS
20) Which of the following does not define Jericho Security Model?
a. Integration
b. Simplifies use of public networks
c. It has a real open security framework
d. Aimed for open solution building blocks
Ans: It has a real open security framework
1) What security device combines IOS firewall with VPN and IPS services?
a. ASA
b. ISR
d. IPS
ANS: B.
a. Cisco ISE
b. PoE
c. 802.1X
d. CSM
ANS: C.
3) The Cisco ________ is an integrated solution led by Cisco that incorporates the network
infrastructure and third-party software to impose security policy on attached endpoints
a. ASA
b. CSM
c. ISR
d. ISE
ANS: D.
a. ISR
b. Cisco ISE
c. ASDM
d. IDM
ANS: C.
5) Cisco IOS Trust and Identity has a set of services that includes which of the following?
a. 802.1X
b. SSL
c. AAA
d. ASDM
ANS: A,B,and C.
6) IOS ______________ offers data encryption at the IP packet level using a set of
standards-based protocols.
a. IPS
b. IPsec
c. L2TP
d. L2F
ANS: B.
7) What provides hardware VPN encryption for terminating a large number of VPN tunnels
for ISRs?
a. ASA SM
d. High-Performance AIM
ANS: D.
8) What are two ways to enhance VPN performance on Cisco ISR G2s?
d. High-Performance AIM
ANS: C and D
9) Which Cisco security solution can prevent noncompliant devices from accessing the
network until they are compliant?
a. IPsec
c. ACS
d. Cisco ISE
ANS: D.
10) Which of the following service modules do Cisco Catalyst 6500 switches support? (Select
all that apply.)
a. ASA SM
c. High-Performance AIM
d. FirePOWER IPS
ANS: A and B
11) What provides packet capture capabilities and visibility into all layers of network data
flows?
ANS: A.
12) Which of the following are identity and access control protocols and mechanisms?
(Select all that apply.)
a. 802.1X
b. ACLs
c. CSM
d. NetFlow
ANS: A and B.
13) Which two of the following are Cisco security management tools?
a. CSM
b. IDS module
c. ACS
d. Cisco ISE
14) True or false: NetFlow is used for threat detection and mitigation?
ANS: True
15) True or false: Cisco ASAs, ASA SM, and IOS firewall are part of infection containment.
ANS: True
16) What IOS feature offers inline deep packet inspection to successfully diminish a wide
range of network attacks?
a. IOS SSH
c. IOS IPsec
d. IOS IPS
ANS: D.
17) What provides centralized control for administrative access to Cisco devices and
security applications?
a. CSM
b. ACS
c. NetFlow
d. ASDM
ANS: B.
18) Match each protocol, mechanism, or feature with its security grouping:
i. CSM
iii. NetFlow
c. Infrastructure protection
d. Security management
ANS: i = D, ii = C, iii = B, iv = A
ANS: C.
a. Host based
b. Network based
c. Application based
d. All of the above
ANS: A and B.
Ans :- A
a. Application layer
b. Network layer
c. Presentation layer
d. Transport layer
ANS: a.
a. Application layer
b. Network layer
c. Presentation layer
d. Transport layer
ANS: B.
a. Traffic of implementation
b. Traffic of interest
c. Traffic of detection
d. None of these
ANS: B
25) ….. Includes denial of services, virus,worm ,infection ,buffer overflow , malfunction ,
file corruption , unauthorised program
a. IDS
b. IPS
c. Attack
d. Both a and b
ANS: C.
a. True positive
b. False positive
c. True Negative
d. False Negative
e. A and B
f. C and D
a. Internal maliciousness
b. External attacks
c. Permanent maliciousness
d. Both a and b
Ans :- D
a. False positive
b. False negative
c. True negative
d. True positive
Ans :- B
a. True positive
b. False negative
c. False positive
d. True negative
Ans:-c
b. Backend option
c. Bountiful array
d. None of these
Ans :- a
second generation ids detect attacks more than short them, prevent them , attempt to add
value
Ans True
Ans :- true
33) two types of Hostbased IDS ?
a) File integrity
b) Behaviour monitoring
c) Static and dynamic
d) All of the above
Ans :- D
Ans:- A
Ans: B
a) Incoming request
b) Report maliciously
c) Html responses
d) Crossed side scripting attacks
e) Sql injection
f) A and D
g) C and E
h) All of the above
Ans: H
Network based ids they work By Capturing and analyzing network packet by on the wire
Ans:- True
38) network tabs dedicate appliances used to mirror a port or interface physically and swith
a) Hostbased
b) Network based
c) Both A and B
d) None of these
Ans:- B
a) Anomaly model
b) Signature detection model
c) Both A and B
d) All of these
Ans:- C
40) anomaly detection IDS looks only at ___________ ?\
a) Physical layer
b) Network packet
c) Network packet header
d) None of these
Ans :- C
41) anomaly detection IDS looks only at Network packet header is called protocol anomaly
detection
Ans :- True
Signature detection or misuse IDS are the most popular types of IDS
Ans :- True
a) Buffer overflow
b) Particular file
c) Particular directory
d) Both A and B
Ans:- D
44) The shortest possible sequence detect is related thread in signature detection model what
was needed ?
a) File
b) Directory
c) Bytes
d) None of these
Ans:- C
Ans:- D
Ans :- B
Ans:- G
Ans:- F
a) Appliance
b) Hardware component
c) Server operating system
d) Software component
Ans :- C
Ans:- A_B_C
a) AAA
b) IP PBX
c) Both A and B
d) None of these
Ans:- A
a) Mobile device
b) eavesdropping
c) Denial of service attack
d) All of the above
Ans:- D
Ans: True
a) Cost
b) Softclient
c) Both a and B
d) None of the
Ans:- C
Ans:- D
Ans :- A
a) Multiple extension
b) Voice mail
c) Remote control
d) Call forwarding
e) All of the above
Ans:-e
Ans:- D
Ans :- A
Ans:- B
61) the operating system security model also known as trusted computing base
Ans: True
a) Set of rules
b) Security functionality
c) Both A and B
d) None of these
Ans:- C
Ans:- A
Ans: D
a) Source address
b) Destination address
c) Ip address
d) Both A and B
Ans:- C
a) Attacker can take control of connection by the session key And Using it to insert is on
traffic
b) Establish TCP IP communication session
c) Combination with dos Attack
d) Man in Middle attack
e) All of the above
Ans:- E
Ans:- B
a) No authentication
b) No encryption
c) Both A and B
d) None of the above
Ans:- C
a) Bell-La-Padula
b) BiBa
c) Clark-wilson
d) All of the above
Ans:- D
Ans :- A_B_C
a) Read only
b) Append
c) Execute
d) Read-write
Ans :- A
72) The Subject can Only Write to The object but it can not be read
a) Execute
b) Read-write
c) Append
d) Read only
Ans:- C
73) Subject can execute the object but can neither read or write
a) Read -write
b) Read only
c) Execute
d) Append
ans :- C
74) subject has both read and write permission to the object
a) Append
b) Read only
c) Execute
d) Read and write
Ans:- D
a) Simple integrity ( no read down can not read the data from lower integrity level )
b) Star integrity ( no write cannot write data to a higher integrity level c) Invocation
property ( can not invoke a subject at a higher integrity level ) d) All of the above
Ans:- D
Ans:- a
Ans:- E
Ans:- A
Ans:- False
Ans:- False
. ..