Top 150+ Solved Information and Network Security MCQ Questions Answer
Q. 1. When one participant in a communication pretends to be someone else, it is called_________?
a. Virus Attacks
b. Fire Attacks
c. Data Driven Attacks
d. Masquerade
Q. ________ is a term used to describe a phishing attack that is specifically aimed at wealthy, powerful, or prominent individuals. Generally CEO’s and important celebrities.
a. Message Authentication Code
b. Steganography
c. Whale phishing
d. A cipher
Q. Compromising confidential information comes under _________.
a. Bug
b. Threat
c. Vulnerability
d. Attack
Q. When an attacker sends unsolicited communication, it is an example of_____.
a. Spoofing
b. Spamming
c. Crackers
d. Sniffers
Q. Masquerading is _______.
a. Attempting to hack a system through backdoors to an operating system or application.
b. Pretending to be an authorized user
c. Always done through IP spoofing
d. Applying a subnet mask to an internal IP range
Q. Integrity is protection of data from all of the following except ________.
a. Unauthorized changes
b. Accidental changes
c. Data analysis
d. Intentional manipulation
Q. A security program cannot address which of the following business goals?
a. Accuracy of information
b. Change control
c. User expectations
d. Prevention of fraud
Q. The absence of a fire-suppression system would be best characterized as_______.
a. Exposure
b. Threat
c. Vulnerability
d. Risk
Q. Asymmetric key cryptography is used for all of the followingexcept_______.
a. Encryption of data
b. Access control
c. Nonrepudiation
d. Steganography
Q. Firewalls are to protect against________.
a. Virus Attacks
b. Fire Attacks
c. Data Driven Attacks
d. Unauthorized Attacks
Q. _______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction.
a. Network Security
b. Database Security
c. Information Security
d. Physical Security
Q. From the options below, which of them is not a vulnerability to information security?
a. Without deleting data, disposal of storage media
b. Latest patches and updates not done
c. Floo
d. D Unchanged default password
Q. Possible threat to any information cannot be ________________.
a. Ignored
b. Protected
c. Transferre
d. D Reduced
Q. A _________ can gain access illegally to a system if the system is not properly tested inscanning and gaining access phase.
a. Security officer
b. Malicious hacker
c. Security auditor
d. Network analyst