1. Which of the following are the components of a UTM appliance?
- Gateway Antispam
- Gateway Antivirus
2. Which of the following are Virus propagation techniques?
- Master Boot Record
- File Infection
- Server Boot Record
- Macro Infection
- Slave Boot Record
3. Which of the following measures are taken to enhance the security of the system? (Select all that apply)
- Operating System based hardening
- Network Based hardening
- Application Based hardening
- Timely Refining of Security Policies
4. Which of the following methods can be used for Network hardening?
- Evaluating IDS
- E-mail Encryption
- Backup of the Mail Server.
- Refining ACLs on routers and switches.
- Up-to-date OS and patches of Network devices.
5. Which of the following are signs of Security breach?
- Data modification and deletion.
- System performance issues.
- Different traffic patterns.
- Large number of failed log in attempts.
6. Which of the following are the placement modes of an IDS/IPS?
7. Which of the following are the advantages of Honeypots?
- Intelligent IDS
- Distracts Hackers
- Encrypts Data
- Decrypts Data
8. Which of the following things should be kept in mind while managing passwords?
- Dictionary words should be used.
- Easily guessed passwords should not be used.
- Passwords should not be stored on a plain view.
- Passwords should be changed once a month.
- Passwords should be shared.
9. Which of the following Symmetric encryption algorithms is/are supported by S/MIME?
10. Which of the following are Email Security protocols?
11. Which of the following can be classified as passive attacks?
- SYN attacks.
- Vulnerability scans.
- ARP Spoofing.
- DoS Attack
12. Select the common VPN protocols.
13. Which of the following are Vulnerability assessment tools?
14. Which of the following are the components of IPSec?
- Authentication Header.
- Authorization Header
- Encapsulated Payload.
- Encapsulating Security Payload.
15. Which of the following appliances help/s in filtering virus packets?
- Antivirus Engines
16. Select the objectives of E-mail security.
- Verifying the source of a message.
- Classifying attachments.
- E-mail backups.
- Message integrity.
17. Which of the following protocols uses UDP:
18. Below are the given statements, which statement shows the breach of Confidentiality:
- Hacker using sniffer tools to view the packets in a network.
- Important data deleted from a document.
- SYN attack on a host.
- Brute Force attack on server.
19. Which of the following goals cannot be achieved with Symmetric cryptography?
20. The ability to exploit a vulnerability is called:
- Permission Escalation
21. Allen wants to sign a message which he is sending to Mark. Which key will Allen use to sign the message?
- Allen’s Public key.
- Allen’s Private key.
- Mark’s Public key.
- Mark’s Private key.
22. Which protocol helps in securing LDAP?
23. By which of the following third parties are Digital Certificates signed?
- Digital Certificate Signing Authority
- Certificate Authority
- Certificate Signing Authority
- Digital Signing Authority.
24. Which of the following Asymmetric encryption algorithms is supported by S/MIME?
25. Which of the following is the standard certificate?
26. Which of the following is an application attack?
- Buffer Overflow
- DNS Poisoning
- Brute Force
27. In how many phases is a IPSec VPN connection completed while making a VPN connection with a Security product?
28. In which of the following protocols does an SYN attack help to find a weakness?
29. Which of the following authentication protocols are used to encrypt passwords?
30. Which protocol is used by TACACS+?
31. Which of the following is an Asymmetric algorithm?
- El Gamal
32. Which of the following helps us to block attacks on a single machine?
- Host Based IDS
- Network Based IDS
- Host Based IPS
- Network Based IPS
33. How many keys are required if two parties communicate using Asymmetric cryptography?
34. What is the key length of Triple DES?
- Variable Length
35. What are the features of an IPS?
- Fault Tolerance.
- Minimal Overhead.
- Timely Alerting Mechanism.
- Anomaly based.
36. Which key is used to decrypt the message in PKI?
- Public Key
- Private Key
- Pre-shared Secret
- Hybrid Key
37. Which of the following statements resembles Trojan horses?
- Self Replication
- Virus Infections
- Installation of Backdoor Programs.
- Displaying Unauthorized Advertisements
38. Which port is used by PPTP?
39. Below are the given statements, which statement shows the breach of Availability:
- SYN attack on a server.
- Deleting important contents from a document.
- Decrypting a credit card during transmission.
- Using wrong password to access authorized documents.
40. A criminal who breaks into computers maliciously is known as
- Black Hat Hacker.
- Grey Hat Hacker
- White Hat Hacker
- Script Kiddie
41. What is function of IPS?
- NATing Device
- A device to block intrusion attacks
- A device to scan for Virus
- Firewall Technology
42. The process of switching protocols between routing devices is called
- Protocol Exchanging
- Protocol Switching
43. Which of the following are Transport Layer Security protocols?
44. A Brute Force attack
- sends SYN packets.
- sends Spam mails.
- prevents the system from responding.
- discovers the passwords.
45. Which of the following statements is true of Tunneling?
- Data is unencrypted
- Only passwords are encrypted.
- Data part is encrypted.
- Contents of the protocol are encapsulated.
46. Which of the following detect/s security weaknesses in a remote or local host?
47. By which of the following can the injection of bogus routes into the core network be prevented ?
- Routed Protocol Authentication
- Routing Protocol Authentication
- Router Authentication
- Route Authentication
48. Mike wants to secure the data on his personal computer. Which of the following options will he choose to secure the data?
- Archiving the data
49. Which protocol is used to secure the WAP communication?
- Secure Wireless Communication.
- WAP Transport Layer Security
- Transport Layer Security
- Wireless Transport Layer Security
50. The part of a company’s intranet which is extended to users outside the company is called:
- Exposed Intranet
51. The concept of allowing access to resources only to those permitted is known as
- Resource Security
52. How many keys are required if two parties communicate using Symmetric cryptography?
53. Which of the following keys helps us in the verification of the Digital Signature?
- Private Key
- Public Key
- Public and Private Key
- Digital Key
54. What is RBL in E-mail Security?
- Realtime Blacking List
- Realtime Blocking List
- Realtime Blackhole List
55. Which of the following techniques is used to approach security in Java?
- Java Applets
56. What does RBL contain?
- IP addresses of mail server
- IP addresses of open relay mail servers
- IP addresses of closed relay mail servers
- Vulnerable ports
57. What is RSA in cryptography?
- Riven, Shamir, Adleman
- Rivest, Shamir, Adleman
- Rivest, Shamid, Adleman
- Rivest, Shamir, Ademan
58. Which of the following are the key principles of Internet Security?
- Confidentiality, Identification, Availability
- Confidentiality, Integrity, Authentication
- Confidentiality, Integrity, Availability
- Confidentiality, Identification, Authentication
59. Which of the following is created to serve as a snare for intruders?
- Honey Pots.
- Vulnerability Assessment Tools
60. What is S/MIME?
- Secure Multipurpose Intranet Mail Extensions
- Secure Multipurpose Internet Mail Extensions
- Secure Multipurpose Internet Message Extensions
- Secure Multipurpose Intranet Message Extensions
61. Which of the following can be transmitted through an E-mail?
- Trojan Horses
- Malicious Codes
- All of the above
62. Joe wants to secure his client’s Web Server. Which of the following measures will he take?
- Managing Access Control
- Eliminating Scripting Vulnerabilities
- Maintaining Integrity.
- Blocking Browser Exploits.
63. Which of the following is Application-level security protocol are used for communications session security?
- Both A and B
- None of the above
64. What is a UTM appliance?
- Unified Threat Manager.
- Unified Threat Management.
- Universal Threat Management.
- Unique Threat Management.
65. In which of the following does Buffer Overflow help us to find weaknesses?
66. In which of the following attacks, sending a large number of spoofed ICMP ECHO requests to broadcast address?
- SYN attack.
- land.c attack
- teardrop.c attack
- SMURF attack
67. Which port does IKE key negotiation protocol use?
- TCP 4500
- UDP 4500
- UDP 500
- UDP 550
68. Which type of authentication is.”Something the user has ” ?
- Single Factor
- Dual Factor
- Triple Factor
- Hybrid Factor
69. Which protocol is used by RADIUS?
70. A positive detection of result that is false or untrue is called
- True Positive
- Event Detection
- False Positive
- False Negative
71. Which of the following are the components of PKI?
- Certificate Authority.
- Organizational Registration Authorities
- Certificate Holders
- Clients that validate digital signatures.
72. Which of the following protocols does not help in securing the FTP?
73. By which of the following methods can social engineering be curbed by?
- Instaling more than 2 firewalls.
- User Education
- Installing 2 antiviruses
- Installing IPS.
74. Which of the following Symmetric algorithms has variable key length?
- Triple DES
- Rivest Cipher 4
75. Which of the following statement shows the breach of Integrity:
- Viewing packets using sniffer tools in a network.
- Encrypting a document.
- Spoof attack on a host.
- Important data deleted from a document.
76. Select the drawbacks of Symmetric key cryptography.
- It can’t implement non-repudiation
- It is scalable
- Key distribution is easy in it
- It is less secure
1,392 total views, 2 views today