Top 250+ Solved Information Cyber Security (ICS) MCQ Questions Answer

From 16 to 30 of 239

Q. Imagine a social networking web app (like Twitter) that allows users to post short blurbs of text.

a. cross-site scripting

b. sql injection

c. packet sniffing

d. a and b

  • d. a and b

Q. Why would a hacker use a proxy server?

a. to create a stronger connection with the target.

b. to create a ghost server on the network.

c. to obtain a remote access connection

d. to hide malicious activity on the network.

  • d. to hide malicious activity on the network.

Q. IPSec is designed to provide security at the _________

a. transport layer

b. network layer

c. application layer

d. session layer

  • b. network layer

Q. Which component is included in IP security?

a. authentication header (ah)

b. encapsulating security payload (esp)

c. internet key exchange (ike)

d. all of the mentioned

  • d. all of the mentioned

Q. What is Firewall?

a. firewalls are network based security measures that control the flow of incoming and outgoing traffic

b. firewall is a program that encrypts all programs that access the internet

c. a firewall is a program that keeps other programs from using the internet

d. firewall are the interrupts that automatically disconnect from the internet when a threat appears.

  • a. firewalls are network based security measures that control the flow of incoming and outgoing traffic

Q. SSL stands for?

a. secured socket layer

b. secured shell layer

c. system socket layer

d. system secured layer

  • a. secured socket layer

Q. What is the most important activity in system hacking?

a. information gathering

b. cracking passwords

c. escalating privileges

d. covering tracks

  • b. cracking passwords

Q. Why would HTTP Tunneling be used?

a. to identify proxy servers

b. web activity is not scanned

c. to bypass a firewall

d. http is a easy protocol to work with

  • c. to bypass a firewall

Q. The _____domains define registered hosts according to their generic behaviour.

a. generic

b. country

c. inverse

d. none

  • a. generic

Q. length of the IPv6 acddress is ....

a. 32 bits

b. 64 bits

c. 16 bits

d. 128 bit

  • d. 128 bit

Q. length of the IPv6 header is....

a. 64 bits

b. 16 bits

c. 32 bits

d. 8 bits

  • c. 32 bits

Q. CIA triad is also known as                  

a. nic (non-repudiation, integrity, confidentiality)

b. aic (availability, integrity, confidentiality)

c. ain (availability, integrity, non-repudiation)

d. aic (authenticity, integrity, confidentiality)

  • b. aic (availability, integrity, confidentiality)
Subscribe Now

Get All Updates & News