Question - 1
_______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure, or destruction.
Network Security
Database Security
Physical Security
Information Security
Show Answer
Solutions
Answer- D
Question - 2
_____ platforms are used for the safety and protection of information in the cloud.
Cloud workload protection platforms
Cloud security protocols
AWS
One Drive
Show Answer
Solutions
Answer- A
Question - 3
Which of the following information security technology is used for avoiding browser-based hacking?
Anti-malware in browsers
Remote browser access
Adware remover in browsers
Incognito mode in a browser
Show Answer
Solutions
Answer- B
Question - 4
Compromising confidential information comes under _________.
Bug
Threat
Vulnerability
Attack
Show Answer
Solutions
Answer- B
Question - 5
Possible threat to any information cannot be ________________.
reduced
transferred
protected
ignored
Show Answer
Solutions
Answer- D
Question - 6
The full form of EDR is _______.
Endpoint Detection and recovery
Early detection and response
Endless Detection and Recovery
Endpoint Detection and response
Show Answer
Solutions
Answer- D
Question - 7
________________ technology is used for analyzing and monitoring traffic in network and information flow.
Network Security Firewall
Network traffic analysis(NTA)
Cloud access security brokers(CASBs)
Managed detection and response(MDR)
Show Answer
Solutions
Answer- B
Question - 8
In which of the following, a person is constantly chased by another person or group of several peoples?
Identity theft
Stalking
Bulling
Phishing
Show Answer
Solutions
Answer- B
Question - 9
Name of the Hacker who breaks the SIPRNET system?
Kevin Poulsen
John von Neumann
Kevin Mitnick
John Draper
Show Answer
Solutions
Answer- A
Question - 10
Which of the following is known as the oldest phone hacking technique used by hackers to make free calls?
Spraining
Phreaking
Cracking
Phishing
Show Answer
Solutions
Answer- B
Question - 11
In the SSL Record Protocol Operation, Pad_2 is-
the Byte 0×36 Repeated 40 times for MD5
the Byte 0×5C Repeated 48 times for MD5
the Byte 0×5C Repeated 48 times for SHA-1
the Byte 0×36 Repeated 48 times for MD5
Show Answer
Solutions
Answer- B
Question - 12
The Certificate_request Message includes two parameters, one of which is-
Certificate_extension
Certificate_creation
Certificate_type
Certificate_exchange
Show Answer
Solutions
Answer- C
Question - 13
In the handshake protocol which is the message type first sent between client and server?
Server_hello
Client_hello
Hello_request
Certificate_request
Show Answer
Solutions
Answer- B
Question - 14
Why would a hacker use a proxy server?
to create a stronger connection with the target
to create a ghost server on the network
to hide malicious activity on the network
to obtain a remote access connection
Show Answer
Solutions
Answer- C
Question - 15
What type of Rootkit will patch, hook, or replace the version of the system call in order to hide information?
Library level rootkits
Kernel level rootkits
System level rootkits
Application level rootkits
Show Answer
Solutions
Answer- A
Question - 16
What is the full form of CIA under information security?
Criminal Investigation Agency
Credit Integrity Assessment
Confidentiality Integrity Availability
Cost Information Agency
Show Answer
Solutions
Answer- C
Question - 17
Which activities endanger the sovereignty and integrity of the nation?
Cyber Terrorism
Cyber vandalism
Cyber squatting
Carding
Show Answer
Solutions
Answer- A
Question - 18
Victims of cyber attack might loose____________.
data
money
Both A and B
None of these
Show Answer
Solutions
Answer- C
Question - 19
Potential weaknesses in IT infrastructure through which a cyber attack might occur is called __.
strength
port
antivirus
vulnerability
Show Answer
Solutions
Answer- D
Question - 20
Directory service permits security administrators to ______.
concentrate on security of directory service instead of individual machines
create new vulnerabilities
damage the security of computers
create new virus
Show Answer
Solutions
Answer- A
Practice more set questions