Professional Documents
Culture Documents
606u6 - Information Security
606u6 - Information Security
2. We use Cryptography term to transforming messages to make them secure and immune to-----------------.
A. Change.
B. Idel.
C. Attacks.
D. Defend.
ANSWER: C
5. Man-in-the-middle attack can endanger security of Diffie-Hellman method if two parties are
not-------------.
A. Authenticated.
B. Joined.
C. Submit.
D. Separate.
ANSWER: A
6. Expansion of IDS is
1 of 22 1/27/2020, 10:46 AM
http://172.16.1.50/printqp.php?heading=III BCA [2017-2020 Batch], S...
11. A-----------------virus has a life that depends on the life of its host.
A. Resident
B. Transient
C. Malicious
D. None of the above
ANSWER: B
2 of 22 1/27/2020, 10:46 AM
http://172.16.1.50/printqp.php?heading=III BCA [2017-2020 Batch], S...
C. Appended
D. Malicious
ANSWER: C
14. A ------------virus are highly structured files that contains both data and commands.
A. Resident
B. Transient
C. Appended
D. Document
ANSWER: D
15. The copying of operating system from disk to memory and transferring the control is called----------
A. Bootstrap
B. Booting
C. Boot sector
D. All the above
ANSWER: A
18. In the ______________ layer of OSI model, packet filtering firewalls are implemented.
A. application layer.
B. session layer.
C. presentation layer.
D. network layer.
ANSWER: D
19. The-----------looked for vulnerable personal computers running Microsoft IIS software.
A. Code blue
B. code black
C. code red
D. None of the above
ANSWER: C
3 of 22 1/27/2020, 10:46 AM
http://172.16.1.50/printqp.php?heading=III BCA [2017-2020 Batch], S...
ANSWER: D
23. A--------attack is a means for malicious code to be launched by a user with lower privileges but run
with a higher privileges.
A. Salami Attack
B. Rootkit Attack
C. Privilege Escalation Attack
D. Trap Door Attack
ANSWER: C
24. A------ is one in which a malicious program interjects itself between the two other programs.
A. Salami Attack
B. Man-in-the-middle Attack
C. Privilege Escalation Attack
D. RootKit Attack
ANSWER: B
25. The general name for these extraordinary paths of communication is ----
A. Convert channel
B. Storage channel
C. FileLock channel
D. All the above
ANSWER: A
26. ----Is a form of virus explicitly designed to hide itself from detection by antivirus software.
A. Stealth virus
B. Polymorphic virus
C. Parasitic virus
D. Macro virus
ANSWER: A
27. A------ creates copies during replication that are functionally equivalent but have distinctly different bit
patterns.
A. Boot Sector virus
B. Polymorphic virus
C. Prasitic virus
D. Macro virus
4 of 22 1/27/2020, 10:46 AM
http://172.16.1.50/printqp.php?heading=III BCA [2017-2020 Batch], S...
ANSWER: B
29. A---- is a program that secretly takes over another Internet-attached computer and then uses that
computer to launch attacks.
A. Worm
B. Zombie
C. Virus
D. Trap doors
ANSWER: B
5 of 22 1/27/2020, 10:46 AM
http://172.16.1.50/printqp.php?heading=III BCA [2017-2020 Batch], S...
36. The most common authentication mechanism for user to operating system is a---------
A. Images
B. Numbers
C. Password
D. None of the above
ANSWER: C
38. Which is a set of circumstances that has the potential to cause or harm in a computing system?
A. Vulnerability
B. Attacks
C. Threats
D. Data
ANSWER: C
41. ----------- means that some unauthorized party has gained access to an asset.
A. Interception
B. Interruption
C. Modification
D. Fabrication
ANSWER: A
6 of 22 1/27/2020, 10:46 AM
http://172.16.1.50/printqp.php?heading=III BCA [2017-2020 Batch], S...
A. Interception
B. Interruption
C. Modification
D. Fabrication
ANSWER: B
43. Unauthorized party might create a----------- of counterfeit objects on computing systems
A. Interception
B. Interruption
C. Modification
D. Fabrication
ANSWER: D
44. The reason to want to perform this attack against the system is---------
A. Method
B. Opportunity
C. Attacker
D. Motive
ANSWER: D
45. The purpose of computer system security is to devise ways to prevent the ---------from being exploited.
A. Weakness
B. Secure
C. Attack
D. Sense
ANSWER: D
47. ________________ gets installed & stays hidden in your computer's memory. It stays involved to the
specific type of files which it infects.
A. Boot Sector Virus.
B. Direct Action Virus.
C. Polymorphic Virus.
D. Multipartite Virus.
ANSWER: B
49. Functions which are much easier to compute than their inverse called
A. One-way function
7 of 22 1/27/2020, 10:46 AM
http://172.16.1.50/printqp.php?heading=III BCA [2017-2020 Batch], S...
B. Hash function
C. Checksum
D. One-way key
ANSWER: A
50. .-------------- means linking each block to the previous block value
A. Checksum
B. One-way
C. Code
D. Chaining
ANSWER: D
51. ---------is a protocol that produces the same effect as a real signature.
A. Public key
B. Cable
C. Protocol
D. Digital signature
ANSWER: D
55. --------- is a method to confine users to one side of boundary in memory and address protection.
A. Fence
B. Fixed fence
C. Granularity
D. Range
ANSWER: B
56. The authentication mechanisms use any of------------ qualities to confirm a user identity.
A. Two
B. Three
C. Four
8 of 22 1/27/2020, 10:46 AM
http://172.16.1.50/printqp.php?heading=III BCA [2017-2020 Batch], S...
D. None of these
ANSWER: A
57. Specialized areas of security are physical, personal, operation, communication, information, and
---------
A. People
B. Authentication
C. Network
D. Operation
ANSWER: C
58. Storage channels pass information by using the presence and absence of objects in -------------
A. Conversion
B. Storage
C. Malicious goals
D. Timing
ANSWER: A
59. ----------- is something the user knows, something the user is, and something the user has.
A. User authentication
B. Group affiliation
C. Limited sharing
D. Password
ANSWER: A
60. Security ------------ is a statement of the security we expect the system to enforce.
A. System
B. Policy
C. Separation
D. Policies
ANSWER: B
62. Software engineers must address ----------- when they manage the configurations of large computer
systems.
A. Security
B. Management
C. Access Control
D. Audit ability
ANSWER: C
63. Which is a way to infer or derive sensitive data from non-sensitive data
A. Accuracy
B. Imprecision
C. Precision
9 of 22 1/27/2020, 10:46 AM
http://172.16.1.50/printqp.php?heading=III BCA [2017-2020 Batch], S...
D. Access control
ANSWER: B
65. Notification that a specific attack has been directed at the information system is----------
A. Alert
B. Authenticity
C. Accuracy
D. Availability
ANSWER: A
68. which is the state or quality of having value for some purpose--------------------
A. Utility
B. Possesson
C. Authentication
D. Authenticate
ANSWER: B
69. _________________ is the kind of firewall is connected between the device and the network
connecting to internet.
A. Hardware Firewall.
B. Software Firewall.
C. Stateful Inspection Firewall.
D. Microsoft Firewall
ANSWER: A
10 of 22 1/27/2020, 10:46 AM
http://172.16.1.50/printqp.php?heading=III BCA [2017-2020 Batch], S...
ANSWER: A
71. ------------ is the most important and versatile tool for a network security.
A. Decryption
B. Encryption
C. Password
D. Mobile agents
ANSWER: B
11 of 22 1/27/2020, 10:46 AM
http://172.16.1.50/printqp.php?heading=III BCA [2017-2020 Batch], S...
80. ----------------is an unforgeable token that gives the processor Certain rights to an object.
A. Capability
B. Integrity
C. Confidentiality
D. Vulnerability
ANSWER: B
12 of 22 1/27/2020, 10:46 AM
http://172.16.1.50/printqp.php?heading=III BCA [2017-2020 Batch], S...
B. Statistical analysis
C. Stealth mode
D. Suspicious
ANSWER: B
89. --------- and ---------- are the 2 flavours of the top level domains.
A. edu & com
B. bint & mill
C. generic & countries
D. net & org
ANSWER: C
13 of 22 1/27/2020, 10:46 AM
http://172.16.1.50/printqp.php?heading=III BCA [2017-2020 Batch], S...
D. record
ANSWER: A
98. To map a name on to an IP address, an applications calls a library procedure called ---------
A. resolver
B. domains
C. protocols
D. packets
ANSWER: A
14 of 22 1/27/2020, 10:46 AM
http://172.16.1.50/printqp.php?heading=III BCA [2017-2020 Batch], S...
100. Once a new domain has been created and registered then it can create its-------
A. Domains
B. Sub domains
C. Trees
D. Boundaries
ANSWER: B
104. A-------------- occurs when the targeted buffer is located on the stack,usually as a local variable in a
function stack frame.
A. Stack buffer overflow
B. Buffer overflow
C. Buffer overrun
D. Stack form
ANSWER: A
15 of 22 1/27/2020, 10:46 AM
http://172.16.1.50/printqp.php?heading=III BCA [2017-2020 Batch], S...
107. The data are usually saved on the stack in a structure known as -----
A. Stack
B. Stack frame
C. Frame
D. Stack buffer
ANSWER: B
112. ----------interconnects PCs and terminals to each other and the mainframe.
A. WAN
B. LAN
C. MAN
D. PAN
ANSWER: B
113. ----- applies a set of rules to each incoming and outgoing IP packet and then forward or discard the
packet.
A. Source IP
B. Packet filter
C. IP protocols
D. Interface
ANSWER: B
16 of 22 1/27/2020, 10:46 AM
http://172.16.1.50/printqp.php?heading=III BCA [2017-2020 Batch], S...
A. Internal
B. Protocols
C. Packet filter
D. Fields
ANSWER: C
115. computer virus,computer worms and Trojan are all different forms of-----
A. Infect
B. Destroyer
C. Viruses
D. Malware
ANSWER: A
116. A computer worms can be defined as ----------- ----------program that is capable of spreading itself to
other machines.
A. Host and infect
B. Cohen and companion
C. Self- replicating and self- contained
D. Virus and trojan worms
ANSWER: C
119. How many set of requirements are needed for a secure electronic voting protocol?
A. 8
B. 7
C. 6
D. 5
ANSWER: B
17 of 22 1/27/2020, 10:46 AM
http://172.16.1.50/printqp.php?heading=III BCA [2017-2020 Batch], S...
123. The common name for the crime of stealing passwords is-----
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
ANSWER: C
124. Collecting personal information and effectively posing as another individual is known as the crime
of---------
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
ANSWER: B
18 of 22 1/27/2020, 10:46 AM
http://172.16.1.50/printqp.php?heading=III BCA [2017-2020 Batch], S...
129. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is
known as----
A. a virus.
B. a Trojan horse.
C. cracking.
D. a denial of service attack.
ANSWER: D
130. -------- is the measurement of things such as fingerprints and retinal scans used for security access.
A. Computer security
B. Biomeasurement
C. Biometrics
D. Smart weapon machinery
ANSWER: C
131. Hardware or software designed to guard against unauthorized access to a computer network is known
as
A. hacker-proof program.
B. firewall.
C. hacker-resistant server.
D. encryption safe wall.
ANSWER: B
134. To prevent the loss of data during power failures, use a -----------
A. encryption program.
B. UPS.
C. surge protector.
D. firewall.
ANSWER: B
19 of 22 1/27/2020, 10:46 AM
http://172.16.1.50/printqp.php?heading=III BCA [2017-2020 Batch], S...
C. encryption
D. lock and key
ANSWER: B
136. Creating strong computer security is used to prevent computer crime and to protect -------------------
A. privacy rights.
B. personal ethics.
C. the number of cookies downloaded to your personal computer.
D. personal space.
ANSWER: A
137. Over ----------- was spent by businesses and government to repair problems in regard to Y2K.
A. 20 million dollars
B. 100 million dollars
C. 1 billion dollars
D. 100 billion dollars
ANSWER: D
20 of 22 1/27/2020, 10:46 AM
http://172.16.1.50/printqp.php?heading=III BCA [2017-2020 Batch], S...
ANSWER: C
21 of 22 1/27/2020, 10:46 AM
http://172.16.1.50/printqp.php?heading=III BCA [2017-2020 Batch], S...
150. Which of the following protocol/standard used by Open Athens for security token exchange?
A. SAML
B. SANL
C. HTTP
D. PGP
ANSWER: A
Staff Name
Kavitha K .
22 of 22 1/27/2020, 10:46 AM