0% found this document useful (0 votes)
51 views22 pages

MCQ Ics Upload 1

Criminal organizations, white hat hackers, malware developers, and cyber-terrorists deploy malwares to systems and networks. Cross Site Scripting (XSS) is the attack referred to in question 2. SQL injection is a code injecting method used for attacking databases. The full form of Malware is Malicious Software. A Denial of Service (DoS) attack takes place when there is excessive data flow that the system cannot handle. Eavesdropping is not a wireless attack. An attempt to harm systems or networks is broadly termed as a cyber attack. Spyware are a collective term for malicious spying programs. Cyber-terrorism is a violent act done using the Internet that threatens technology users or leads to loss of

Uploaded by

Nilesh Bangar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views22 pages

MCQ Ics Upload 1

Criminal organizations, white hat hackers, malware developers, and cyber-terrorists deploy malwares to systems and networks. Cross Site Scripting (XSS) is the attack referred to in question 2. SQL injection is a code injecting method used for attacking databases. The full form of Malware is Malicious Software. A Denial of Service (DoS) attack takes place when there is excessive data flow that the system cannot handle. Eavesdropping is not a wireless attack. An attempt to harm systems or networks is broadly termed as a cyber attack. Spyware are a collective term for malicious spying programs. Cyber-terrorism is a violent act done using the Internet that threatens technology users or leads to loss of

Uploaded by

Nilesh Bangar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Que No Question Option A Option B Option C

Criminal
organizations,
Criminal Black hat
1 Criminal organizations, hackers,
organizations, White Black hat software
hat hackers, malware hackers, malware developers,
Who deploy Malwares to a developers, cyber- developers, cyber-
system or network? terrorists cyber-terrorists terrorists

This attack can be deployed by


infusing a malicious code in a Cross Site
2 website’s comment section. Request
What is “this” attack referred to Cross Site Scripting Forgery
here? (XSS) SQL injection (XSRF)
 _____________ is a code
3 injecting method used for
attacking the database of a Malicious
system / website. HTML injection XML Injection code injection
4 The full form of Malware is Malfunctioned
________ Malicious Software Multipurpose Soft Software
When there is an excessive
5 amount of data flow, which the
system cannot handle, _____ Buffer Overflow
attack takes place. DoS (Denial of Serviceattack Database crash
6 Which of them is not a wireless
attack? Eavesdropping Wireless HijackingPhishing
An attempt to harm, damage or
7 cause threat to a system or
network is broadly termed as
______ Cyber Attack Digital crime Cyber-crime

These are a collective term for


malicious spying programs used
8 for secretly monitoring Remote
someone’s activity and actions Access
over a digital medium. Malware Spyware Trojans

9  _________ are the special type


of programs used for recording
and tracking user’s keystroke. Trojans Virus Worms
___________ is a violent act
10 done using the Internet, which
either threatens any technology
user or leads to loss of life or
otherwise harms anyone in order
to accomplish political gain. Cyber-terrorism Cyber campaign Cyber attack
______ means the protection of
11 data from modification by
unknown users. Integrity Confidentiality Authentication
When you use the word _____ it
12 means you are protecting your
data from getting disclosed. Integrity Authentication Availability
Unexpected
13 What are the different ways to combinations and Race
intrude? unhandled input Buffer overflows conditions

14 What are the different ways to Host &


classify an IDS? Zone based Network & Zone bNetwork based
What are the major components
15 of the intrusion detection
system? Analysis Engine Event provider Alert Database

Anything
It models the distinct from
16 normal usage of the noise is not
network as a assumed to be
What are the characteristics of It doesn’t detect novel noise intrusion
anomaly based IDS? attacks characterization activity

17 It models the Most are


normal usage of based on
It is programmed to network as a simple pattern
What are the characteristics of interpret a certain noise matching
signature based IDS? series of packets characterization algorithms
A method used by an IDS that
18 involves checking for a pattern to Protocol
identify unauthorized activity Pattern Matching Session Splicing Decoding
A list or table of stored by a
19 router (or switch) that controls Session
access to and from a network. State Table Access Control Li Splicing
An analysis method used by
20 some IDS that looks for
instances that are not considered
normal behavior. Stateful Inspection Anomaly Detectio Evasion

Bypassing a device, or
performing another action, to
21 attack or place malware on a
target network without being
detected. Stateful Inspection Anomaly Detectio Evasion

A type of firewall closely related


to a packet filter that can track
22 the status of a connection
through use of a state table that
keeps track of connection
activities. Stateful Inspection Anomaly Detectio Evasion

A tool that uses the monitoring


of network traffic, detection of
23 unauthorized access attempts,
and notification of unauthorized
access attempts to network Access Control
administrator. Anomaly Detection List (ACL) Intrusion Detec
A type of stateless inspection
24 used in some routers and
firewalls to limit flow of traffic
to what is on the ACL. Packet Filter Proxy Server Evasion
25 A way of looking at raw packet Protocol Decod
data. Proxy Server Session Splicing

A server (or application) that


intercepts the requests clients
make of another server, fills the
26 requests that it can, and then Proxy Server
forwards the requests it can't
handle on to the other server thus
helping to improve performance
and security. Honeypot Packet Filter
A table in which data about
27 connection activity is kept by a Proxy Server
stateful firewall. Honeypot Packet Filter
Something set up on a separate
network (or in DMZ) to attract
hackers and lure them away from
28 the real network; it logs Proxy Server
keystrokes, provides other
information about an attacker,
and also provides warning that
someone is trying to attack your
network. Honeypot Packet Filter

A way to change network


address information in IP packet Network Address
29 headers with a router by Translation
connecting multiple computers (NAT)
using one IP address connected
to the Internet (or IP network) to
convert many private addresses Access Control List Anomaly
into one public address. (ACL) Detection
A method of avoiding detection
30 by an IDS by sending portions of Protocol Decod
a request in different packets. Proxy Server Session Splicing

These are very slow It doesnt


31 What is major drawback of It generates many detect novel
at detection
anomaly detection IDS ? false alarms attacks

It models the
32 normal usage
It is programmed of network as
Most are based on to interpret a a noise
What are characteristics of simple pattern certain series of characterizatio
signature based IDS ? matching algorithms packets n

They have to
33 be
programmed
again for every
What are drawbacks of signature They are unable to They suffer from new pattern to
based IDS ? detect novel attacks false alarms be detected
Logs includes Logs are
34 The host operating logins,file opens analysed to
What are characteristics of Host system logs in the and program detect tails of
based IDS ? audit information executions intrusion
Unselective logging
35 of messages may Selective logging
What are drawbacks of the host increase the audit runs the rish of They are very
based IDS ? burdens missed attacks fast to detect
Communication between end
36 systems is encrypted using a key,
often known as temporary key session key line key

37 In asymmetric key cryptography,


the private key is kept by
__________ sender receiver sender and rece
If end to end connection is done
38 at a network or IP level, and if
there are N hosts, then what is
the number of keys required? N N(N-1)/2 N(N+1)/2

both algorithm
39 for performing
encryption and
decryption and
decrypted encrypted
In cryptography, what is cipher? encrypted message message message
Which one of the following
40 algorithm is not used in electronic code diffie-hellman
asymmetric-key cryptography? RSA algorithm book algorithm algorithm

both
transpositional
41 In cryptography, the order of the ciphers and
letters in a message is rearranged substitution
by __________ substitution ciphers ciphers quadratic cipher

42 For a network with N nodes, how


many master keys are present? N N(N-1)/2 N(N+1)/2
43 What is data encryption standard
(DES)? block cipher stream cipher bit cipher
explicit
44 Which one of the following is a stream control congestion
cryptographic protocol used to transmission protocol transport layer notification
secure HTTP connection? (SCTP) security (TLS) (ECN)
to find some
45 insecurity in a
Cryptanalysis is used cryptographic
__________ to increase the speed scheme to encrypt the d
symmetric key not an
46 ElGamal encryption system is Asymmetric key encryption encryption
__________ encryption algorithm algorithm algorithm
47 Session keys are transmitted after temporary
being encrypted by make-shift keys master keys keys
both fixed size
48 Cryptographic hash function bit string and
takes an arbitrary block of data variable size bit variable size
and returns _________ fixed size bit string string bit string
In public key cryptosystem
49 _____ keys are used for Encryption
encryption and decryption. Same Different Keys

The DES Algorithm Cipher


50 System consists of
____________rounds (iterations)
each with a round key 16 18 9
51 Feistel Cipher
DES follows Hash Algorithm Structure Caesars Cipher
52 PDU stands for Pre data underscore Permuted data unitProtocol data un
53 Public-key cryptography is also symmetric
known as ? asymmetric cryptograpcryptography Both A and B
54 Which of the following keys are
known only to the owner? public key protected key private key
55 How many function PKI accompli 1 2 3
56 private key
PKI stands for? public key infrastructu infrastructure public key inst

A communication is said to be
insecure where data is
57 transmitted in a manner that
allows for interception also
called? attack sniffing ISP

58 Private key
Knapsack problem can be solved Public key cryptosyst cryptosystem Both A and B
59 Examples of hash functions are MD5 SHA-1 Both A and B
60 Which has a key length of 128 bit IDEA Triple-DES Both A and B
Private key algorithm is used for
61 _____ encryption and public key
algorithm is used for _____ Session key, Can be used
encryption. Messages, session key messages for both
Encryption &
62 In public key cryptosystem Decryption
which is kept as public? Decryption keys Encryption keys keys

The Public
Key contains a
special
function which
63 is used to
encrypt the
message and
Assymmetric Encryption: Why A so called "one which can
can a message encrypted with the way function with only be
Public Key only be decrypted Not true, the message back door" is reversed by
with the receiver's appropriate can also be decrypted applyed for the the appropriate
Private Key? with the Public Key. encryption. Private Key.

First, the message is First, the


encrypted with message is
symmetric encryption encrypted with
64 and aferwards it is assymmetric
encrypted encryption and
assymmetrically The secret key is aferwards it is
together with the key. symmetrically encrypted
In which way does the Combined transmitted, the symmetrically
Encryption combine symmetric message itself together with
and assymmetric encryption? assymmetrically. the key.
More complex and Problem of the
65 therefore more time- secure Less secure
Which is the largest disadvantage consuming transmission of encryption
of the symmetric Encryption? calculations. the Secret Key. function.
All functions
are public,
66 The key indicates The key contains only the key is
which funcion is used the secret secret. It
for encryption. function for contains the
Thereby it is more encryption parameters
difficult to decrypt a including used for the
intercepted message parameters. Only encryption
Which is the principle of the as the function is a password can resp.
encryption using a key? unknown. activate the key. decryption.

67 Elliptic curve cryptography


follows the associative property. YES NO May be

The plaintext message consist of


single letters with 5-bit
numerical equivalents from
68 (00000)2 to (11001)2. The secret
deciphering key is the
superincreasing 5-tuple (2, 3, 7,
15, 31), m = 61 and a = 17. Find
the ciphertext for the message
“WHY”. C= (148, 143, 50) C= (148, 143, 56) C= (143, 148, 9

For p = 11 and q = 17 and choose


69 e=7. Apply RSA algorithm 23 64 11
where PT message=88 and thus
find the CT.

For p = 11 and q = 17 and choose


70 e=7. Apply RSA algorithm 88 122 143
where Cipher message=11 and
thus find the plain text.
When a hash function is used to
provide message authentication,
71 Message Digest Message Score
the hash function value is
referred to as Message Field
72 Message authentication code is message key
also known as key code keyed hash functiohash function
73 Another name for Message cryptographic cryptographic
authentication codes is cryptographic checks codebreak checkbreak
74
MACs are also called testword checkword testbits

A scheme in
75 A scheme in which the
which the password is
A scheme in which password is passed through
What is a one-way password the password is XOR jumbled and a PRF, which
file? with a key and stored stored is then stored
76
MAC is a many-to-one mapping one-to-one mappinonto mapping
Which one of the following is
77 not an application hash
functions? Key wrapping One-way passwordIntrusion detect
78 IPSec is designed to provide
security at the _________ Application layer Transport layer Network layer
79 In tunnel mode, IPSec protects
the ______ Entire IP packet IP header IP payload
Encapsulating Internet key
80 Which component is included in Security Payload Exchange
IP security? Authentication Header(ESP) (IKE)
Extensible authentication
81 protocol is authentication
framework frequently used in Wired local area Wired personal
______ network area network Wireless netwo
82 Pretty good privacy (PGP) is
used in ______ WiFi security Browser security Email security
International data Internet data
83 PGP encrypts data by using a Private data encryption encryption
block cipher called ______ encryption algorithm algorithm algorithm

84 Utility to calculate MD5 digests


for your password. Jacksum CheckSum BeanShell

When a DNS server accepts and


uses incorrect information from a
85 host that has no authority giving
that information, then it is called
_________ DNS lookup DNS hijacking DNS authorizin
An attempt to make a computer
86 resource unavailable to its
intended users is called ______ Denial-of-service attacVirus attack Worms attack
___________ ensures the
87 integrity and security of data that
are passing over a network. Firewall Antivirus Pentesting Tool
88 Which of the following is not a
strong security protocol?  HTTPS SSL SMTP
Which of the following is not a
89 secured mail transferring
methodology? POP3 SSMTP Mail using PGP

__________ is a set of
conventions & rules set for
90 communicating two or more
devices residing in the same
network? Security policies Protocols Wireless netwo
Hyperlinked
91 Secured Hyper Text Transfer
Hypertexts Transfer Text Transfer Protocol
HTTPS is abbreviated as _______Protocol Secured Protocol Secured

92 integrity and non- authenticity


SSL primarily focuses on ______ integrity and authenticirepudiation and privacy
MAC
MAC (Message MAC (Message (Machine
93
 In SSL, what is used for Access Code) Authentication Authentication
authenticating a message? Code) Code)

94 __________ is used for


encrypting data at network level. IPSec HTTPS SMTP

Secure/ Secure/
95 Secure/Multimedia Multipurpose Multimedia
S/MIME is abbreviated as Internet Mailing Internet Mailing Internet Mail
__________________ Extensions Extensions Extensions
Users are able to see a pad-lock
96 icon in the address bar of the
browser when there is _______
connection. HTTP HTTPS SMTP
97 For encrypted
For making data sent over
information move HTTP
Why did SSL certificate require For making security w faster protocol
Secure Folder
98 Secured File Transfer
SFTP is abbreviated as ________ Secure File Transfer P Transfer Protocol Protocol

99 Personal Private
Private Connecting Communication Communicatio
PCT is abbreviated as ________ Technology Technology n Technique
_________ operates in the
100 transport mode or the tunnel
mode. IPSec SSL PGP
101
 IKE creates SAs for _____. SSL PGP IPSec

102
______ provides either
authentication or encryption, or
both, for packets at the IP level. AH ESP PGP
103 One security protocol for the e-
mail system is _________. IPSec SSL PGP
Typically, ______ can receive
104 application data from any
application layer protocol, but
the protocol is normally HTTP. SSL TLS either (a) or (b)

105  IKE is a complex protocol based 2 3 4


on ______ other protocols.
Option D Answer weightage Unit

Criminal
organization
s, gray hat
hackers, B 1 MARK 1
Malware
developers,
Penetration
testers

A 1 MARK 1
HTML
Injection

D 1 MARK 1
SQL
Injection
Malfunction A 1 MARK 1
ed

B 1 MARK 1
Data overflo
C 1 MARK 1
MAC Spoofi

A 1 MARK 1
System hijac

B 1 MARK 1

Keyloggers

D 1 MARK 1
Keylogger
A 1 MARK 1

Cyber-warfar

Non- A 1 MARK 1
repudiation

D 1 MARK 1
Confidentiali

D 1 MARK 1
All of the me

C 1 MARK 1
Level based

All of the D 1 MARK 1


mentioned

B 1 MARK 1
It detects
based on
signature

Anything
distinct
from the C 1 MARK 1
noise is
assumed to
be intrusion
activity

State Table A 1 MARK 1

Packet B 1 MARK 1
Filter
B 1 MARK 1
Pattern
Matching

C 1 MARK 1
Pattern
Matching

A 1 MARK 1

Pattern
Matching

C 1 MARK 1

Session
Splicing

A 1 MARK 1
State
Table
Pattern Matc C 1 MARK 1

B 1 MARK 1

State
Table

State D 1 MARK 1
Table
A 1 MARK 1

State
Table

Intrusion
Detection
B 1 MARK 1
System
(IDS)

Pattern Matc B 1 MARK 1

B 1 MARK 1
None of the

Anything
distinct
from the A 1 MARK 1
noise is
assumed to
be intrusion
activity

D 1 MARK 1

All of the me

D 1 MARK 1
All of the me
They have
to be
programme A 1 MARK 1
d for new
patterns

B 1 MARK 2
 section key

all the
connected B 1 MARK 2
devices to
the network

B 1 MARK 2
N/2

algorithm
for D 1 MARK 2
performing
encryption
and
decryption

B 1 MARK 2
DES algorit

D 1 MARK 2

transposition

A 1 MARK 2
N/2
A 1 MARK 2
byte cipher

resource B 1 MARK 2
reservation
protocol
B 1 MARK 2
to make new

block cipher A 1 MARK 2


method
B 1 MARK 2
section keys

variable A 1 MARK 2
sized byte
string

None of the B 1 MARK 2


mentioned

A 1 MARK 2

12
B 1 MARK 2
SP Networks
Protocol data D 1 MARK 2
A 1 MARK 2
None of the
C 1 MARK 2
unique key
4 B 1 MARK 2
A 1 MARK 2
private key i

B 1 MARK 2

citation
Unique key
cryptosyste A 1 MARK 2
m
None of the C 1 MARK 2
RSA C 1 MARK 2
A 1 MARK 2
None of the

B 1 MARK 2
None of the

The
encrypted
message B 1 MARK 2
contains the
function for
decryption
which
identifies
the Private
Key.

The secret
key is
assymmetri D 1 MARK 2
cally
transmitted,
the message
itself
symmetrical
ly.

B 1 MARK 2
Isn't used
any more.
The key
prevents the
user of
having to
reinstall the
software at C 1 MARK 2
each change
in
technology
or in the
functions
for
encryption.

A 1 MARK 2
Can't say

A 1 MARK 2

C= (148, 132

54 C 1 MARK 2

111 A 1 MARK 2

B
Message
1 MARK 3
Leap

B
1 MARK 3
hash code
A
cryptograph 1 MARK 3
ic codesum
none of the D
1 MARK 3
mentioned
D

A scheme 1 MARK 3
in which the
hash of the
password is
stored
none of the A
1 MARK 3
mentioned
B
Virus 1 MARK 3
Detection
Session C
1 MARK 3
layer
A
1 MARK 3
IP trailer
D
1 MARK 3
All of the me
C
Wired
metropolita 1 MARK 3
n area
network
C
1 MARK 3
FTP security
Local data B
encryption 1 MARK 3
algorithm
A
None of the 1 MARK 3
mentioned
D

1 MARK 3

DNS spoofin
A
1 MARK 3
Botnet proce
Network-
security D 1 MARK 3
protocols
C 1 MARK 3
SFTP

A 1 MARK 3
S/MIME

B 1 MARK 3

 Network algorithms
Hyper Text
Transfer D 1 MARK 3
Protocol
Secure
confidential
ity and A 1 MARK 3
integrity
MAC
(Machine B 1 MARK 3
Access
Code)

A 1 MARK 3
S/MIME

Secure/
Multipurpos
e Internet D 1 MARK 3
Mail
Extensions

B 1 MARK 3
SFTP
For sending
and C 1 MARK 3
receiving
emails
unencrypted
Secure File
Transferrin A 1 MARK 3
g Protocol
Private
Communica D 1 MARK 3
tion
Technology

none of the A 1 MARK 3


above
none of the C 1 MARK 3
above

B 1 MARK 3

SSL
none of the C 1 MARK 3
above

D 1 MARK 3
both (a) and

5 C 1 MARK 3

You might also like