JOIN ADRE 2.0 Telegram Group

Cyber Security Multiple Choice Questions and Answers | Cyber Security MCQs and Answers

Questions
1 Firewall as part of a router program
A filters only packets coming from internet
B filters only packets going to internet
C filters packets travelling from and to the intranet from the internet
D ensures rapid traffic of packets for speedy e-Commerce

Answer: filters packets travelling from and to the intranet from the internet
2 A firewall may be implemented in
A routers which connect intranet to internet
B bridges used in an intranet
C expensive modem
D user’s application programs

Answer: routers which connect intranet to internet
Advertisement
ADRE 2.0 Mock Test - 5 Start Test
ADRE 2.0 Mock Test - 5 Start Test

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

3 A firewall is a
A wall built to prevent fires from damaging a corporate intranet
B security device deployed at the boundary of a company to prevent unauthorized physical access
C security device deployed at the boundary of a corporate intranet to protect it from unauthorized access
D device to prevent all accesses from the internet to the corporate intranet

Answer: security device deployed at the boundary of a corporate intranet to protect it from unauthorized access
4 By security in e-Commerce we mean

(i) Protecting an organization’s data resource from unauthorized access

(ii)Preventing disasters from happening

(iii) Authenticating messages received by an organization

(iv) Protecting messages sent on the internet from being read and understood by unauthorized persons/organizations

A i, ii
B ii, iii
C iii, iv
D i, iii, iv

Answer: i, iii, iv
5 EDI (Electronic Data Interchange) standard
A is not easily available
B defines several hundred transaction sets for various business forms
C is not popular
D defines only a transmission protocol

Answer: defines several hundred transaction sets for various business forms
6 For secure EDI (Electronic Data Interchange) transmission on internet
A MIME is used
B S/MIME is used
C PGP is used
D TCP/IP is used

Answer: S/MIME is used
7 . EDI (Electronic Data Interchange) over internet uses
A MIME to attach EDI forms to e-mail messages
B FTP to send business forms
C HTTP to send business forms
D SGML to send business forms

Answer: MIME to attach EDI forms to e-mail messages
8 EDI (Electronic Data Interchange) use
A requires an extranet
B requires value added network
C can be done on internet
D requires a corporate intranet

Answer: can be done on internet
9 What Security tradeoff occurs while using IDS (Intrusion Detection System)?
A Change in permission
B Login Failures
C Change in privilege
D Performance degradation

Answer: Performance degradation
10 A company requires each employee to power off his computer at the end of the day. This rule was implemented to make the network _______
A perform better
B more reliable
C more secure
D more error-free

Answer: more secure
11 By symmetric key encryption we mean
A one private key is used for both encryption and decryption
B private and public key used are symmetric
C only public keys are used for encryption
D only symmetric key is used for encryption

Answer: one private key is used for both encryption and decryption
12 The following ciphertext was received. The plaintext was permuted using permutation (34152) and substitution. Substitute character by character +3 (A Æ D, etc). The plain text after decryption is: Cipher text :PDLJDLXHVQC
A MAIGAIUESNZ
B IAMAGENIUSZ
C LDPDJHPLXVZ
D IAMAGENIUSC

Answer: IAMAGENIUSZ
13 By applying permutation (31254) and substitution by 5 characters away from current character (A Æ F , B Æ G etc..) the following string ABRACADABRA becomes
A FGWCAAADRBF
B RABCAAADRBF
C WFGHFFFIWGF
D None of the above

Answer: WFGHFFFIWGF
14 Encryption can be done
A only on textual data
B only on ASCII coded data
C on any bit string
D only on mnemonic data

Answer: on any bit string
15 Encryption is required to

(i) protect business information from eavesdropping when it is transmitted on internet

(ii) efficiently use the bandwidth available in PSTN

(iii) to protect information stored in companies’ databases from retrieval

(iv) to preserve secrecy of information stored in databases if an unauthorized person retrieves it

A i and ii
B ii and iii
C iii and iv
D i and iv

Answer: i and iv
16 By encryption of a text we mean
A compressing it
B expanding it
C scrambling it to preserve its security
D hashing it

Answer: scrambling it to preserve its security
17 A hardened firewall host on an Intranet is
A a software which runs in any of the computers in the intranet
B a software which runs on a special reserved computer on the intranet
C a stripped down computer connected to the intanet
D a mainframe connected to the intranet to ensure security

Answer: a software which runs on a special reserved computer on the intranet
18 A hardened firewall host on an intranet

(i) has a proxy application gateway program running on it

(ii)Allows specified internet users to access specified services in the intranet

(iii) Initiates all internet activities requested by clients and monitors them

(iv) prevents outsiders from accessing IP addresses within the intranet

A i, ii
B i, ii, iii
C i, ii, iii, iv
D ii, iii, iv

Answer: i, ii, iii, iv
19 Proxy application gateway

(i) acts on behalf of all intranet users wanting to access internet securely

(ii)monitors all accesses to internet and allows access to only specified IP addresses

(iii) disallows use of certain protocols with security problems

(iv) disallows all internet users from accessing intranet

A i, ii
B i, ii, iii
C i, ii, iii, iv
D ii, iii, iv

Answer: i, ii, iii
20 Main function of proxy application gateway firewall is
A to allow corporate users to use efficiently all internet services
B to allow intranet users to securely use specified internet services
C to allow corporate users to use all internet services
D to prevent corporate users from using internet services

Answer: to allow intranet users to securely use specified internet services

ADRE 2.0 MOCK TEST

Take Mock Tests

Government Schemes Mock Test Start Test!
Political Science Mock Test – 42 Start Test
History Test – 190 Start Test
Quantitative Aptitude Test Start Test!
Trigonometry - Mock Test Start Test!
Data Interpretation - Mock Test Start Test!
General Awareness - Mock Test Start Test!
Reasoning Ability - Mock Test Start Test!
Englist(Antonyms) Mock Test 1 Start Test!
Quantitative Aptitude (Percentage) Mock Test Start Test!
Economy Mock Test 1 Unlock Test!
Books & Authors - Test 2 Unlock Test!
Advertisement