Q1.
___________hardware device is used for sniffing purposes.
-
(A)
Switch
-
(B)
Hub
-
(C)
router
-
(D)
Ethernet convertor
Q2.
Which one is not a security guideline for the internet?
-
(A)
Internet must be accessed from a computer specially earmarked for it.
-
(B)
Keep accurate record of internet access.
-
(C)
Install a Dial-up Modem on your office computer.
-
(D)
None of these
Ans: (C) - Install a Dial-up Modem on your office computer.
Q3.
_________are attackers that are not a trusted member of the target organization.
-
(A)
Unstructured threats
-
(B)
Structured threats
-
(C)
External threats
-
(D)
Internal threats
Ans: (C) - External threats
Q4.
_______examples of non-observance of security measures by computer users?
-
(A)
Poor password management.
-
(B)
Accounting of removable magnetic media.
-
(C)
Good administration of networks.
-
(D)
None of these.
Ans: (A) - Poor password management.
Q5.
The typical PC is _____ to the quality of its electrical power source.
-
(A)
Sensitive
-
(B)
Response
-
(C)
Ideal
-
(D)
Requires
Q6.
One of the methods of attacking a computer network is______________.
-
(A)
Password sniffing
-
(B)
No IP spoofing
-
(C)
No port scanning
-
(D)
none of these
Ans: (A) - Password sniffing
Q7.
HTTP works on----------------------port.
-
(A)
25
-
(B)
80
-
(C)
81
-
(D)
110
Q8.
______________automated process that looks for open networking ports.
-
(A)
Port scanning
-
(B)
Ethernet scanning
-
(C)
Serial port scanning
-
(D)
None of these
Q9.
Firewall is used to control the flow of_________.
-
(A)
Information
-
(B)
Data
-
(C)
Patches
-
(D)
Traffic
Q10.
___________can be disguised to appear as harmless or even beneficial for the computer.
-
(A)
Trojan horses
-
(B)
Viruses
-
(C)
Worms
-
(D)
None of them
Q11.
__________is the method of defending a computer network.
-
(A)
DDoS
-
(B)
Honey pots
-
(C)
Buffer over flow
-
(D)
port scannig
Q12.
____________Software used for encryption and secure deletion of files and folders.
-
(A)
Secure Desk
-
(B)
Truecyrpt
-
(C)
Secure keeper
-
(D)
Zone alarm
Q13.
A personal firewall is a piece of____________that resides on an individual workstation primarily to protect that workstation.
-
(A)
Hardware
-
(B)
Program
-
(C)
Instruction
-
(D)
software
Q14.
__________is the typical cyber attack in a computer network.
-
(A)
Honey pots
-
(B)
IP Spoofing
-
(C)
Anti spoofing
-
(D)
firewall
Q15.
Hacker uses multiple computers to carry out a DoS attack is called_________.
-
(A)
DDoS
-
(B)
DoS
-
(C)
Sniffing
-
(D)
Spoofing
Q16.
________________________security guidelines for the internet.
-
(A)
Do official work on the internet computer
-
(B)
Install a Dial-up Modem on your office computer
-
(C)
Locate the internet computer in a separate access
-
(D)
None of them.
Ans: (C) - Locate the internet computer in a separate access
Q17.
___________are attackers that are less trusted members of the target organization with some degree of access.
-
(A)
Unstructured threats
-
(B)
Structured threats
-
(C)
External threats
-
(D)
Internal threats
Ans: (B) - Structured threats
Q18.
___________ Provides encrypted access from outside a network.
-
(A)
VPN
-
(B)
L3 Switch
-
(C)
Firewall
-
(D)
L2 Switch
Q19.
__________. Tools that scan a network periodically for holes/open gateways.
-
(A)
Vulnerability Scanners
-
(B)
Firewalls
-
(C)
Trojan Horse
-
(D)
Spyware
Ans: (A) - Vulnerability Scanners
Q20.
_____________Encrypt files and folders containing sensitive information.
-
(A)
Avast
-
(B)
Secure Desk
-
(C)
Secure keeper
-
(D)
None of them
Q21.
Designers and users of large _______ systems have long been aware of the need to provide security and privacy for these systems.
-
(A)
Automated data processing (ADP)
-
(B)
Automated digital processing (ADP)
-
(C)
Automated data policy (ADP)
-
(D)
Automated data privacy (ADP)
Ans: (A) - Automated data processing (ADP)
Q22.
CERT stands for ____.
-
(A)
Computer emergency response team
-
(B)
Common errase repair team
-
(C)
Comn east reaction team
-
(D)
Computer emergency reserve team
Ans: (A) - Computer emergency response team
Q23.
__________is the dynamic defensive system in a computer network.
-
(A)
IDS
-
(B)
Trojan Horse
-
(C)
Firewall
-
(D)
None of them
Q24.
___________is not the dynamic defensive system in a computer network.
-
(A)
IDS
-
(B)
Firewall
-
(C)
IPS
-
(D)
Honey pots
Q25.
Programs and files can similarly be protected by _____ which plays a major role in prevention of disturbances.
-
(A)
Passwords
-
(B)
Lock
-
(C)
Firewall
-
(D)
Filter
Q26.
One of the possible loopholes in a computer network is___________.
-
(A)
Password protection
-
(B)
No password protection
-
(C)
Use of antivirus
-
(D)
Use of firewall
Ans: (B) - No password protection
Q27.
Spyware is a_______________.
-
(A)
Hardware
-
(B)
Software
-
(C)
Skin ware
-
(D)
None of these.
Q28.
_______________dummy objects used to attract attacks.
-
(A)
Honey Pots
-
(B)
DoS
-
(C)
DDoS
-
(D)
Sniffing
Q29.
____________are individual or small groups of attackers who rely on readymade tools and published vulnerabilities.
-
(A)
Unstructured threats
-
(B)
Structured threats
-
(C)
External threats
-
(D)
Internal threats
Ans: (A) - Unstructured threats
Q30.
_____________ is attackers that are not a trusted member of the target's organization.
-
(A)
External threats
-
(B)
Internal threats
-
(C)
Simple threats
-
(D)
None of them
Ans: (A) - External threats