Information Security Question Bank PDF
Information Security Question Bank PDF
UNIT-1
MCQ:-
A. Replay B. Masquerade
C. Traffics Analysis D. Denial Of Service
7. _____ is one type of security service.
A. Data Integrity B. Authentication
C. Access Control D. Non-repudiation
8. A threat which intercept or modify data on behalf of users who should not have access to that
data.
1 Hiren Patel
INFORMATION SECURITY
Short Questions
1. Define threat & attack.
2. List the different types of security attacks.
3. Define passive attack & active attack.
4. List the different types of security services.
5. What do you mean by security attack, security mechanism and security services?
6. What is masquerade and replay?
7. Draw diagram of Model for network security.
8. Define information access threats and service threats.
9. What do you mean by access control and data confidentiality?
Long Questions
1. What is the difference between active and passive security threats?
2. What is security attack? Explain in detail with its types?
3. Explain active attack in detail.
4. Explain passive attack in detail.
5. List and briefly define categories of security services.
6. List and briefly define categories of active and passive security attacks.
Explain the network security model in detail.
2 Hiren Patel
INFORMATION SECURITY
UNIT -2
MCQ
Question Bank
Multiple Choice Questions
1. Cryptography is also known as _____.
2. _____ is the original message or data is fed into the algorithm as input.
that
(A). Plaintext (B). Encryption Algorithm
3 Hiren Patel
INFORMATION SECURITY
SHORT QUESTIONS:-
Short Questions
1. What is cryptography? Give name of its components.
Long Questions
4 Hiren Patel
INFORMATION SECURITY
UNIT-3
1. _____ is an individual who is not authorized to use the computer.
A. Misfeasor B. Masquerader
C. Clandestine User D. None of these
2. The _____ is a person who is authorized for access but misuse his or her privileges.
A. Misfeasor B. Masquerader
C. Clandestine User D. None of these
3. When _____ are executed, it may produce one or more copies of itself to be activated later on
the same or some other system.
A. Logic Bomb B. Back Doors
C. Worms D. Boot Programs
4. The _____ is a mechanism that bypasses a normal security check.
A. Logic Bomb B. Trojan Horse
C. Bacteria D. Trapdoor
5. A _____ is a program or a part of program that are activated by a trigger.
A. Virus B. Logic Bomb C. Worms D. Trojan Horses
6. IDS stand for _____.
A. Intruder Detection System B. Instruction Detection System
C. Intrusion Detection System D. None of these 7. IPS stand
for _____.
A. Intrusion Prevention System B. Intruder Prevention System C.
Instruction Prevention System D. Intrusion Protection System
5 Hiren Patel
INFORMATION SECURITY
Short Questions
1. List classes of intruders.
2. What do you mean by misfeasor?
3. What is the use of IDSs and IPSs systems?
4. Define: Virus [Vital Information Resource Under Seize] and Worm.
5. Define: Logic Bomb and Backdoor.
6. Give two examples software threat that do not replicate.
7. Give two examples software threat that replicates it.
8. Write the 3 parts of computer virus.
9. Write triggering and execution phase during virus lifetime.
Long Questions
1. Write a brief note on Intruders.
6 Hiren Patel
INFORMATION SECURITY
UNIT-4
7 Hiren Patel
INFORMATION SECURITY
Important Questions
1. What is Firewall?
2. What are the characteristics of Firewall?
8 Hiren Patel