0% found this document useful (0 votes)
41 views8 pages

Information Security Question Bank PDF

The document is a question bank for an Information Security course at Sardar Patel University, covering multiple choice questions, short questions, and long questions across four units. Topics include threats and attacks, cryptography, intruders, and firewalls. It aims to assess knowledge on various aspects of information security.

Uploaded by

jaydip3174
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views8 pages

Information Security Question Bank PDF

The document is a question bank for an Information Security course at Sardar Patel University, covering multiple choice questions, short questions, and long questions across four units. Topics include threats and attacks, cryptography, intruders, and firewalls. It aims to assess knowledge on various aspects of information security.

Uploaded by

jaydip3174
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

INFORMATION SECURITY

SARDAR PATEL UNIVERSITY


Information Security ||US06DIIT56)||
QUESTION BANK

UNIT-1
 MCQ:-

Multiple Choice Questions


1. Which action is that compromises the security of information owned by an organization?

A. Threat B. Security Attack C. Service Attack D. None of these


2. The ____ is the process that is designed to detect, prevent or recover from a security.

A. Security Mechanism B. Security Attack


C. Service Attack D. Threat
3. The ___ attacks are in nature of eavesdropping on, or monitoring of transmission.

A. Active Attack B. Passive Attack C. Service Attack D. Both A & B


4. Which one is the category of the active attack?
A. Passive Attack B. Masquerade C. Traffic Analysis D. Both A & C
5. Traffic Analysis is the type of _____.
A. Active Attack B. Passive Attack C. Service Attack D. Both A & B
6. Which category of active attack involves the passive capture of a data unit and its subsequent
retransmission?

A. Replay B. Masquerade
C. Traffics Analysis D. Denial Of Service
7. _____ is one type of security service.
A. Data Integrity B. Authentication
C. Access Control D. Non-repudiation
8. A threat which intercept or modify data on behalf of users who should not have access to that
data.

1 Hiren Patel
INFORMATION SECURITY

A. Information Access Threats B. Service Threats


C. Access Control D. Non-repudiation
9. Which threats exploit service flaws in computers to inhibit use by legitimate users?

A. Information Access Threats B. Service Threats


C. Access Control D. Non-repudiation
10. The _____ control is the ability to limit and control the access to host system and applications via
communication links.

A. Authentication B. Active & Passive C. Access D. None of these

Short Questions
1. Define threat & attack.
2. List the different types of security attacks.
3. Define passive attack & active attack.
4. List the different types of security services.
5. What do you mean by security attack, security mechanism and security services?
6. What is masquerade and replay?
7. Draw diagram of Model for network security.
8. Define information access threats and service threats.
9. What do you mean by access control and data confidentiality?

Long Questions
1. What is the difference between active and passive security threats?
2. What is security attack? Explain in detail with its types?
3. Explain active attack in detail.
4. Explain passive attack in detail.
5. List and briefly define categories of security services.
6. List and briefly define categories of active and passive security attacks.
Explain the network security model in detail.

2 Hiren Patel
INFORMATION SECURITY

UNIT -2
 MCQ
Question Bank
Multiple Choice Questions
1. Cryptography is also known as _____.

(A). Plaintext Writing (B). Stream Writing

(C). Secret Writing (D). None of the given

2. _____ is the original message or data is fed into the algorithm as input.
that
(A). Plaintext (B). Encryption Algorithm

(C). Secret Key (D). Cipher text

3. The _____ performs various and transformations on the plaintext.


substitutions
(A). Plaintext (B). Encryption Algorithm
(C). Secret Key (D). Cipher text

4. The exact substitution and ion performed by the algorithm


transformat on the _____ key. depend

(A). Plaintext (B). Encryption Algorithm

(C). Secret Key (D). Cipher text

5. _____ is the scrambled message as output.


produced
(A). Plaintext (B). Encryption Algorithm

(C). Secret Key (D). Cipher text

6. The process of attempting to discover e plaintext or key is known as _____.


th

3 Hiren Patel
INFORMATION SECURITY

(A). Cryptanalysis (B). Cipher text

(C). Stream Cipher (D). Block Cipher

7. _____ cipher process the input ts continuously, producing output one


elemen element at a time.

(A). Block Cipher (B). Stream Cipher


(C). Byte Cipher (D). None of the given

8. _____ is not a type of attack on message.


encrypted
(A). Known Plaintext (B). Chosen Cipher text

(C). Chosen Plaintext (D). None of the given

 SHORT QUESTIONS:-

Short Questions
1. What is cryptography? Give name of its components.

2. What are the principles of Symmetric / Conventional encryption?

3. Define Plaintext and Cipher text.

4. Define Cryptography and Crypto Analysis.

5. What are the types of attacks on encrypted message?

6. What are the applications of public key cryptosystem?

7. Which keys are required in public key cryptography?

8. Differentiate public key and private key.

9. Give the classification of cryptographic system in short.

10. Difference between substitution and transposition ciphers.

Long Questions

4 Hiren Patel
INFORMATION SECURITY

1. What is cryptography? Explain Symmetric key and


Asymmetric key cryptography.

2. Explain Cryptography and Crypto analysis in detail.

3. What are the types of traditional ciphers? Explain.

4. Explain public key cryptography in detail.

5. Describe the application for public key cryptosystem.

6. Explain Conventional / Symmetric encryption principles and model of symmetric


encryption.

7. Explain Substitution and transposition cipher.

UNIT-3
1. _____ is an individual who is not authorized to use the computer.
A. Misfeasor B. Masquerader
C. Clandestine User D. None of these
2. The _____ is a person who is authorized for access but misuse his or her privileges.
A. Misfeasor B. Masquerader
C. Clandestine User D. None of these
3. When _____ are executed, it may produce one or more copies of itself to be activated later on
the same or some other system.
A. Logic Bomb B. Back Doors
C. Worms D. Boot Programs
4. The _____ is a mechanism that bypasses a normal security check.
A. Logic Bomb B. Trojan Horse
C. Bacteria D. Trapdoor
5. A _____ is a program or a part of program that are activated by a trigger.
A. Virus B. Logic Bomb C. Worms D. Trojan Horses
6. IDS stand for _____.
A. Intruder Detection System B. Instruction Detection System
C. Intrusion Detection System D. None of these 7. IPS stand
for _____.
A. Intrusion Prevention System B. Intruder Prevention System C.
Instruction Prevention System D. Intrusion Protection System

5 Hiren Patel
INFORMATION SECURITY

8. Infection mechanism also referred as _____.


A. Infection spread B. Infection Vector
C. Infection Propagation D. All of above
9. What the virus does besides spreading is known as _____.
A. Triggering B. Dormant
C. Infection Vector D. Payload

Short Questions
1. List classes of intruders.
2. What do you mean by misfeasor?
3. What is the use of IDSs and IPSs systems?
4. Define: Virus [Vital Information Resource Under Seize] and Worm.
5. Define: Logic Bomb and Backdoor.
6. Give two examples software threat that do not replicate.
7. Give two examples software threat that replicates it.
8. Write the 3 parts of computer virus.
9. Write triggering and execution phase during virus lifetime.

10. Write different virus classification by target.


11. Write the approach used by the antivirus.

Long Questions
1. Write a brief note on Intruders.

2. Write a short note on Backdoors.


3. Explain in detail Trojan Horses.

4. Explain all phases during virus lifetime.

5. Classify the virus in detail.

6 Hiren Patel
INFORMATION SECURITY

UNIT-4

UNIT-4 Firewall MCQ


1 A_______ is a hardware device or a software program.
a) Firewall b) Fire device c) Home Network d) None of these.

2. All traffic from inside the organization_______ Network.


a) Public b) Private c) Both a & b d) None of these.

3. A Firewall is a focus for __________


a) Choke point b) narrow checkpoint c) traffic d) security decisions

4. All traffic passes through the __________.


a) Firewall b) digital signature c) private Network d) none of these.

5. Firewalls offer excellent protection against ___________.


a) New threats b) public threats c) Network threats d) virus.

6. __________ A firewall can’t protect you against.


a) Malicious insiders b) traffic c) Network connection d) public

7. A firewall will prevent people from setting up new and ___________.


a) Private services b) trustworthy services c) Insecure services d) none of
these.
8 A ___________ filtering firewall applies a set of rule to each IP packet
and then forward or discards the packet.
a) Private filtering b) packet c) trusted d) none of these.

7 Hiren Patel
INFORMATION SECURITY


Important Questions

1. What is Firewall?
2. What are the characteristics of Firewall?

3. Firewalls are mainly used for which purposes?

4. Where are Firewalls needed and why?

5. What can a Firewall do?


6. What can’t a Firewall do?

7. Explain the types of Firewalls/Firewall Techniques/Functions of Firewall.

8. Explain SATAN [Security Analysis Tool For Analyzing Network].

8 Hiren Patel

You might also like