Aptitude Reasoning English GK Computer Knowledge Programming Skill Banking Software Testing



Question - 1

_______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure, or destruction.

  • Network Security
  • Database Security
  • Physical Security
  • Information Security
Solutions
Question - 2

_____ platforms are used for the safety and protection of information in the cloud.

  • Cloud workload protection platforms
  • Cloud security protocols
  • AWS
  • One Drive
Solutions
Question - 3

Which of the following information security technology is used for avoiding browser-based hacking?

  • Anti-malware in browsers
  • Remote browser access
  • Adware remover in browsers
  • Incognito mode in a browser
Solutions
Question - 4

Compromising confidential information comes under _________.

  • Bug
  • Threat
  • Vulnerability
  • Attack
Solutions
Question - 5

Possible threat to any information cannot be ________________.

  • reduced
  • transferred
  • protected
  • ignored
Solutions
Question - 6

The full form of EDR is _______.

  • Endpoint Detection and recovery
  • Early detection and response
  • Endless Detection and Recovery
  • Endpoint Detection and response
Solutions
Question - 7

________________ technology is used for analyzing and monitoring traffic in network and information flow.

  • Network Security Firewall
  • Network traffic analysis(NTA)
  • Cloud access security brokers(CASBs)
  • Managed detection and response(MDR)
Solutions
Question - 8

In which of the following, a person is constantly chased by another person or group of several peoples?

  • Identity theft
  • Stalking
  • Bulling
  • Phishing
Solutions
Question - 9

Name of the Hacker who breaks the SIPRNET system?

  • Kevin Poulsen
  • John von Neumann
  • Kevin Mitnick
  • John Draper
Solutions
Question - 10

Which of the following is known as the oldest phone hacking technique used by hackers to make free calls?

  • Spraining
  • Phreaking
  • Cracking
  • Phishing
Solutions
Question - 11

In the SSL Record Protocol Operation, Pad_2 is-

  • the Byte 0×36 Repeated 40 times for MD5
  • the Byte 0×5C Repeated 48 times for MD5
  • the Byte 0×5C Repeated 48 times for SHA-1
  • the Byte 0×36 Repeated 48 times for MD5
Solutions
Question - 12

The Certificate_request Message includes two parameters, one of which is-

  • Certificate_extension
  • Certificate_creation
  • Certificate_type
  • Certificate_exchange
Solutions
Question - 13

In the handshake protocol which is the message type first sent between client and server?

  • Server_hello
  • Client_hello
  • Hello_request
  • Certificate_request
Solutions
Question - 14

Why would a hacker use a proxy server?

  • to create a stronger connection with the target
  • to create a ghost server on the network
  • to hide malicious activity on the network
  • to obtain a remote access connection
Solutions
Question - 15

What type of Rootkit will patch, hook, or replace the version of the system call in order to hide information?

  • Library level rootkits
  • Kernel level rootkits
  • System level rootkits
  • Application level rootkits
Solutions
Question - 16

What is the full form of CIA under information security?

  • Criminal Investigation Agency
  • Credit Integrity Assessment
  • Confidentiality Integrity Availability
  • Cost Information Agency
Solutions
Question - 17

Which activities endanger the sovereignty and integrity of the nation?

  • Cyber Terrorism
  • Cyber vandalism
  • Cyber squatting
  • Carding
Solutions
Question - 18

Victims of cyber attack might loose____________.

  • data
  • money
  • Both A and B
  • None of these
Solutions
Question - 19

Potential weaknesses in IT infrastructure through which a cyber attack might occur is called __.

  • strength
  • port
  • antivirus
  • vulnerability
Solutions
Question - 20

Directory service permits security administrators to ______.

  • concentrate on security of directory service instead of individual machines
  • create new vulnerabilities
  • damage the security of computers
  • create new virus
Solutions
Tags:
Information Security MCQ (Multiple Choice Questions), Advanced Information Security MCQ, Information Security MCQ Online test,Information Security MCQ Questions and answers PDF, Information Security Interview Questions With Answers, Information Security Technical Questions with full explanation