Top 50+ Solved Information Security MCQ Questions Answer

From 31 to 44 of 44

Q. This is a trial and error method used to decode encrypted data through exhaustiveeffort rather than employing intellectual strategies.

a. Chaffing and winnowing

b. Cryptanalysis

c. Serendipity

d. Brute force cracking

  • d. Brute force cracking

Q. This type of intrusion relies on the intruder's ability to trick people into breakingnormal security procedures.

a. Shoulder surfing

b. Hijacking

c. Brain fingerprinting

d. Social engineering

  • d. Social engineering

Q. This is a program in which harmful code is contained inside apparently harmlessprogramming or data.

a. Snort

b. Honeypot

c. Blue bomb

d. Trojan horse

  • d. Trojan horse

Q. What "layer" of an e-mail message should you consider when evaluating e-mailsecurity?

a. TCP/IP

b. SMTP

c. Body

d. All of the above

  • d. All of the above
Subscribe Now

Get All Updates & News