Top 150+ Solved Information and Network Security MCQ Questions Answer

From 16 to 30 of 106

Q. 1. When one participant in a communication pretends to be someone else, it is called_________?

a. Virus Attacks

b. Fire Attacks

c. Data Driven Attacks

d. Masquerade

  • d. Masquerade

Q. Compromising confidential information comes under _________.

a. Bug

b. Threat

c. Vulnerability

d. Attack

  • b. Threat

Q. When an attacker sends unsolicited communication, it is an example of_____.

a. Spoofing

b. Spamming

c. Crackers

d. Sniffers

  • a. Spoofing

Q. Masquerading is _______.

a. Attempting to hack a system through backdoors to an operating system or application.

b. Pretending to be an authorized user

c. Always done through IP spoofing

d. Applying a subnet mask to an internal IP range

  • b. Pretending to be an authorized user

Q. Integrity is protection of data from all of the following except ________.

a. Unauthorized changes

b. Accidental changes

c. Data analysis

d. Intentional manipulation

  • c. Data analysis

Q. A security program cannot address which of the following business goals?

a. Accuracy of information

b. Change control

c. User expectations

d. Prevention of fraud

  • a. Accuracy of information

Q. The absence of a fire-suppression system would be best characterized as_______.

a. Exposure

b. Threat

c. Vulnerability

d. Risk

  • c. Vulnerability

Q. Asymmetric key cryptography is used for all of the followingexcept_______.

a. Encryption of data

b. Access control

c. Nonrepudiation

d. Steganography

  • d. Steganography

Q. Firewalls are to protect against________.

a. Virus Attacks

b. Fire Attacks

c. Data Driven Attacks

d. Unauthorized Attacks

  • d. Unauthorized Attacks

Q. The first computer virus is__________.

a. The famous

b. HARLIE

c. PARAM

d. Creeper

  • d. Creeper

Q. _______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction.

a. Network Security

b. Database Security

c. Information Security

d. Physical Security

  • c. Information Security

Q. From the options below, which of them is not a vulnerability to information security?

a. Without deleting data, disposal of storage media

b. Latest patches and updates not done

c. Floo

d. D Unchanged default password

  • c. Floo

Q. Possible threat to any information cannot be ________________.

a. Ignored

b. Protected

c. Transferre

d. D Reduced

  • a. Ignored

Q. A _________ can gain access illegally to a system if the system is not properly tested inscanning and gaining access phase.

a. Security officer

b. Malicious hacker

c. Security auditor

d. Network analyst

  • b. Malicious hacker
Subscribe Now

Get All Updates & News