Вы находитесь на странице: 1из 26

1. In computer security, .

means that computer system assets can be modified


only by authorized parities.
A) Confidentiality
B) Integrity
C) Availability
D) Authenticity

2. In computer security, .. means that the information in a computer system


only be accessible for reading by authorized parities.
A) Confidentiality
B) Integrity
C) Availability
D) Authenticity

3. The type of threats on the security of a computer system or network are ..


i) Interruption ii) Interception iii) Modification
iv) Creation v) Fabrication
A) i, ii, iii and iv only
B) ii, iii, iv and v only
C) i, ii, iii and v only
D) All i, ii, iii, iv and v

4. Which of the following is independent malicious program that need not any host program?
A) Trap doors
B) Trojan horse
C) Virus
D) Worm

5. The .. is code that recognizes some special sequence of input or is triggered by being
run from a certain user ID of by unlikely sequence of events.
A) Trap doors
B) Trojan horse
C) Logic Bomb
D) Virus

6. The .. is code embedded in some legitimate program that is set to explode when
certain conditions are met.
A) Trap doors
B) Trojan horse
C) Logic Bomb
D) Virus

7. Which of the following malicious program do not replicate automatically?


A) Trojan Horse
B) Virus
C) Worm
D) Zombie

8. programs can be used to accomplish functions indirectly that an unauthorized


user could not accomplish directly.
A) Zombie
B) Worm
C) Trojan Horses
D) Logic Bomb

9. State whether true of false.


i) A worm mails a copy of itself to other systems.
ii) A worm executes a copy of itself on another system.
A) True, False
B) False, True
C) True, True
D) False, False

10. A .. is a program that can infect other programs by modifying them, the
modification includes a copy of the virus program, which can go on to infect other programs.
A) Worm
B) Virus
C) Zombie
D) Trap doors
Answers:
1. B) Integrity 6. C) Logic Bomb
2. A) Confidentiality 7. A) Trojan Horse
3. C) i, ii, iii and v only 8. C) Trojan Horses
4. D) Worm 9. C) True, True
5. A) Trap doors 10. B) Virus
1. When an attempt is to make a machine or network resource unavailable to its intended users,
the attack is called
a) denial-of-service attack
b) slow read attack
c) spoofed attack
d) starvation attack
View Answer
Answer:a
Explanation:None.
2. The code segment that misuses its environment is called a
a) internal thief
b) trojan horse
c) code stacker
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
3. The internal code of any software that will set of a malicious function when specified
conditions are met, is called
a) logic bomb
b) trap door
c) code stacker
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
4. The pattern that can be used to identify a virus is known as
a) stealth
b) virus signature
c) armoured
d) multipartite
View Answer
Answer:b
Explanation:None.
5. Which one of the following is a process that uses the spawn mechanism to revage the system
performance?
a) worm
b) trojen
c) threat
d) virus
View Answer
Answer:a
Explanation:None.
6. What is a trap door in a program?
a) a security hole, inserted at programming time in the system for later use
b) a type of antivirus
c) security hole in a network
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
7. Which one of the following is not an attack, but a search for vulnerabilities to attack?
a) denial of service
b) port scanning
c) memory access violation
d) dumpster diving
View Answer
Answer:b
Explanation:None.
8. File virus attaches itself to the
a) source file
b) object file
c) executable file
d) all of the mentioned
View Answer
Answer:c
Explanation:None.
9. Multipartite viruses attack on
a) files
b) boot sector
c) memory
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
10. In asymmetric encryption
a) same key is used for encryption and decryption
b) different keys are used encryption and decryption
c) no key is required for encryption and decryption
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
1) Which of the following are forms of malicious attack ?
a) Theft of information
b) Modification of data
c) Wiping of information
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
2) What are common security threats ?
a) File Shredding
b) File sharing and permission
c) File corrupting
d) File integrity
View Answer
Answer: b
Explanation: Sharing and associated permissions are usual exploits which can compromised the
system.
3) From the following, which is not a common file permission ?
a) Write
b) Execute
c) Stop
d) Read
View Answer
Answer: c
Explanation: None.
4) Which of the following is a good practice ?
a) Give full permission for remote transferring
b) Grant read only permission
c) Grant limited permission to specified account
d) Give both read and write permission but not execute.
View Answer
Answer: c
Explanation: limited access is a key method to circumvent unauthorized access and exploits.
5) What is not a good practice for user administration ?
a) Isolating a system after a compromise
b) Perform random auditing procedures
c) Granting privileges on a per host basis
d) Using telnet and FTP for remote access.
View Answer
Answer: d
Explanation: Telnet and FTP are not encrypted and can be compromised.
6) Which of the following is least secure method of authentication ?
a) Key card
b) fingerprint
c) retina pattern
d) Password
View Answer
Answer: d
Explanation: Passwords can be be compromised more easily than to replicate a physical thing
like key card, fingerprint or retina.
7) Which of the following is a strong password ?
a) 19thAugust88
b) Delhi88
c) P@assw0rd
d) !augustdelhi
View Answer
Answer: c
Explanation: It has a combination of Alphabet both capital and small along with number and
special character. Thus always use complex password with combination of all these.
8) Why is one time password safe ?
a) It is easy to generated
b) It cannot be shared
c) It is different for every access
d) It is a complex enctypted password
View Answer
Answer: c
Explanation: One time password is safe since it is generated per access and thus cannot be brute
forced or deduced.
9) What does Light Directory Access Protocol (LDAP) doesnt store ?
a) Users
b) Address
c) Passwords
d) Security Keys
View Answer
Answer: b
Explanation: None.
10) What is characteristic of RADIUS system ?
a) It is essential for centralized encryption and authentication
b) It works on Network layer to deny access to unauthorized people
c) It provides centralized authentication mechanism via network devices
d) Its a strong File access system.
View Answer
Answer: c
Explanation: None.
11) Which happens first authorization or authentication ?
a) Authorization
b) Authentication
c) Both are same
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
12) What is characteristics of Authorization ?
a) RADIUS and RSA
b) 3 way handshaking with syn and fin.
c) Multilayered protection for securing resources
d) Deals with privileges and rights
View Answer
Answer: d
Explanation: None.
13) What forces the user to change password at first logon ?
a) Default behavior of OS
b) Part of AES encryption practice
c) Devices being accessed forces the user
d) Account administrator
View Answer
Answer: d
Explanation: Its administrators job to ensure that password of the user remains private and is
known only to user. But while making a new user account he assigns a random general password
to give it to user. Thus even administrator cannot access a particular users account.
14) What is not a best practice for password policy ?
a) Deciding maximum age of password
b) Restriction on password reuse and history
c) Password encryption
d) Having change password every 2 years.
View Answer
Answer: d
Explanation: Old passwords are more vulnerable to being misplaced or compromised. Passwords
should be changed periodically to enhance security.

Q1. What is Trend Micro?

1. It is anti-virus software
2. It is just a program
3. It is virus program
4. None of the above

View Answer / Hide Answer

ANSWER: It is anti-virus software

Q2. What is the name of the viruses that fool a user into downloading and/or executing them by
pretending to be useful applications?

1. Cracker
2. Worm
3. Trojan horses
4. Keylogger

View Answer / Hide Answer

ANSWER: Trojan horses


Q3. The virus that spread in application software is called as

1. Boot virus
2. Macro virus
3. File virus
4. Anti virus

View Answer / Hide Answer

ANSWER: Macro virus

Q4. How does a Le-Hard virus come into existence?

1. Hardware
2. Software
3. FRIDAY 13
4. Command.Com

View Answer / Hide Answer

ANSWER: Command.Com

Q5. What is the virus that spread in computer?

1. It is hardware
2. It is system software
3. It is a computer program
4. It is a windows tool

View Answer / Hide Answer

ANSWER: It is a computer program

Q6. What kind of attempts is made by individuals to obtain confidential information from a
person by falsifying their identity?

1. Computer viruses
2. Spyware scams
3. Phishing scams
4. None of the above
View Answer / Hide Answer

ANSWER: Phishing scams

Q7. When does the time bomb occur?

1. During a particular logic and data


2. During a particular time
3. During a particular data or time
4. None of the above

View Answer / Hide Answer

ANSWER: During a particular data or time

Q8. Delayed payload of some viruses is also called as

1. Time
2. Bomb
3. Anti-virus
4. None of the above

View Answer / Hide Answer

ANSWER: Bomb

Q9. What is the first boot sector virus?

1. Brain
2. Mind
3. ELK cloner
4. None of the above.

View Answer / Hide Answer

ANSWER: Brain
Q10. What is the name of first computer virus?

1. The Famous
2. HARLIE
3. PARAM
4. Creeper

View Answer / Hide Answer

ANSWER: Creeper

Q11. The difference between a virus and a self-replicating program which is like a virus is that
rather than creating copies of itself on only one system it propagate through computer

network. What is the self replicating program called?

1. Keylogger
2. Cracker
3. Worm
4. All of the above

View Answer / Hide Answer

ANSWER: Worm

Q12. What is anti-virus?

1. It is a computer
2. It is a program code
3. It is a company name
4. It is an application

View Answer / Hide Answer

ANSWER: It is a program code

Previous
Next
Post your comment

Discussion
RE: Computer Virus - computer awareness questions -Brinda Mishra (03/07/15)
Correct answer is Phishing scams and not Computer Virus

What kind of attempts is made by individuals to obtain confidential information from a person
by falsifying their identity?

1. Computer viruses
2. Spyware scams
3. Phishing scams
4. None of the above

View Answer / Hide Answer

ANSWER: Computer viruses


This section of our 1000+ Computer Networks MCQs focuses on Cryptography.
1. In cryptography, what is cipher?
a) algorithm for performing encryption and decryption
b) encrypted message
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
2. In asymmetric key cryptography, the private key is kept by
a) sender
b) receiver
c) sender and receiver
d) all the connected devices to the network
View Answer
Answer:b
Explanation:None.
3. Which one of the following algorithm is not used in asymmetric-key cryptography?
a) RSA algorithm
b) diffie-hellman algorithm
c) electronic code book algorithm
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
4. In cryptography, the order of the letters in a message is rearranged by
a) transpositional ciphers
b) substitution ciphers
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
5. What is data encryption standard (DES)?
a) block cipher
b) stream cipher
c) bit cipher
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
6. Cryptanalysis is used
a) to find some insecurity in a cryptographic scheme
b) to increase the speed
c) to encrypt the data
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
7. Which one of the following is a cryptographic protocol used to secure HTTP
connection?
a) stream control transmission protocol (SCTP)
b) transport layer security (TSL)
c) explicit congestion notification (ECN)
d) resource reservation protocol
View Answer
Answer:b
Explanation:None.
8. Voice privacy in GSM cellular telephone protocol is provided by
a) A5/2 cipher
b) b5/4 cipher
c) b5/6 cipher
d) b5/8 cipher
View Answer
Answer:a
Explanation:None
9. ElGamal encryption system is
a) symmetric key encryption algorithm
b) asymmetric key encryption algorithm
c) not an encryption algorithm
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
10. Cryptographic hash function takes an arbitrary block of data and returns
a) fixed size bit string
b) variable size bit string
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
The correct answer for each question is indicated by a .

________ is the science and art of transforming messages to make


1 INCORRECT
them secure and immune to attacks.

A) Cryptography

B) Cryptoanalysis

C) either (a) or (b)

D) neither (a) nor (b)

2 INCORRECT The ________is the original message before transformation.

A) ciphertext

B) plaintext

C) secret-text

D) none of the above

3 INCORRECT The ________ is the message after transformation.

A) ciphertext

B) plaintext

C) secret-text

D) none of the above


4 INCORRECT A(n) _______ algorithm transforms plaintext to ciphertext

A) encryption

B) decryption

C) either (a) or (b)

D) neither (a) nor (b)

5 INCORRECT A(n) ______ algorithm transforms ciphertext to plaintext.

A) encryption

B) decryption

C) either (a) or (b)

D) neither (a) nor (b)

A combination of an encryption algorithm and a decryption


6 INCORRECT
algorithm is called a ________.

A) cipher

B) secret

C) key

D) none of the above


The _______ is a number or a set of numbers on which the cipher
7 CORRECT
operates.

A) cipher

B) secret

C) key

D) none of the above

In a(n) ________ cipher, the same key is used by both the sender and
8 CORRECT
receiver.

A) symmetric-key

B) asymmetric-key

C) either (a) or (b)

D) neither (a) nor (b)

9 INCORRECT In a(n) ________, the key is called the secret key.

A) symmetric-key

B) asymmetric-key

C) either (a) or (b)

D) neither (a) nor (b)

10 CORRECT In a(n) ________ cipher, a pair of keys is used.

A) symmetric-key
B) asymmetric-key

C) either (a) or (b)

D) neither (a) nor (b)

11 INCORRECT In an asymmetric-key cipher, the sender uses the__________ key.

A) private

B) public

C) either (a) or (b)

D) neither (a) nor (b)

12 INCORRECT In an asymmetric-key cipher, the receiver uses the ______ key.

A) private

B) public

C) either (a) or (b)

D) neither (a) nor (b)

13 INCORRECT A ________ cipher replaces one character with another character.

A) substitution

B) transposition

C) either (a) or (b)

D) neither (a) nor (b)


_________ ciphers can be categorized into two broad categories:
14 INCORRECT
monoalphabetic and polyalphabetic.

A) Substitution

B) Transposition

C) either (a) or (b)

D) neither (a) nor (b)

The _______ cipher is the simplest monoalphabetic cipher. It uses


15 INCORRECT
modular arithmetic with a modulus of 26.

A) transposition

B) additive

C) shift

D) none of the above

16 CORRECT The Caesar cipher is a _______cipher that has a key of 3.

A) transposition

B) additive

C) shift

D) none of the above


The ________ cipher reorders the plaintext characters to create a
17 CORRECT
ciphertext.

A) substitution

B) transposition

C) either (a) or (b)

D) neither (a) nor (b)

A(n) ______ is a keyless substitution cipher with N inputs


18 INCORRECT and M outputs that uses a formula to define the relationship between
the input stream and the output stream.

A) S-box

B) P-box

C) T-box

D) none of the above

A(n) _______is a keyless transposition cipher with N inputs


19 INCORRECT and M outputs that uses a table to define the relationship between the
input stream and the output stream.

A) S-box

B) P-box

C) T-box

D) none of the above

20 UNANSWERED A modern cipher is usually a complex _____cipher made of a


combination of different simple ciphers.

A) round

B) circle

C) square

D) none of the above

21 INCORRECT DES is a(n) ________ method adopted by the U.S. government.

A) symmetric-key

B) asymmetric-key

C) either (a) or (b)

D) neither (a) nor (b)

DES has an initial and final permutation block and _________


22 INCORRECT
rounds.

A) 14

B) 15

C) 16

D) none of the above

23 INCORRECT The DES function has _______ components.

A) 2

B) 3

C) 4
D) 5

24 INCORRECT DES uses a key generator to generate sixteen _______ round keys.

A) 32-bit

B) 48-bit

C) 54-bit

D) 42-bit

25 INCORRECT ________ DES was designed to increase the size of the DES key

A) Double

B) Triple

C) Quadruple

D) none of the above

_______ is a round cipher based on the Rijndael algorithm that uses


26 INCORRECT
a 128-bit block of data.

A) AEE

B) AED

C) AER

D) AES
27 CORRECT AES has _____ different configurations

A) two

B) three

C) four

D) five

28 INCORRECT ECB and CBC are ________ ciphers.

A) block

B) stream

C) field

D) none of the above

One commonly used public-key cryptography method is the ______


29 INCORRECT
algorithm.

A) RSS

B) RAS

C) RSA

D) RAA

The ________ method provides a one-time session key for two


30 INCORRECT
parties.
A) Diffie-Hellman

B) RSA

C) DES

D) AES

The _________ attack can endanger the security of the Diffie-


31 INCORRECT
Hellman method if two parties are not authenticated to each other.

A) man-in-the-middle

B) ciphertext attack

C) plaintext attack

D) none of the above


1. Which of the following are the solutions to network security?
i) Encryption ii) Authentication
iii) Authorization iv) Non-repudiation
A) i, ii and iii only
B) ii, iii and iv only
C) i, iii and iv only
D) All i, ii, iii and iv

2. is to protect data and passwords.


A) Encryption
B) Authentication
C) Authorization
D) Non-repudiation

3. The following protocols and system are commonly used to provide various degrees of security
services in computer network.
i) IP filtering ii) Reverse Address Translation
iii) IP security Architecture (IPsec) iv) Firewalls v) Socks
A) i, ii, iii and iv only
B) i, iii, iv and v only
C) ii, iii, iv and v only
D) All i, ii, iii, iv and v
4. A firewall is installed at the point where the secure internal network and untrusted external
network meet which is also known as
A) Chock point
B) meeting point
C) firewall point
D) secure point

5. Which of the following is / are the types of firewall?


A) Packet Filtering Firewall
B) Dual Homed Gateway Firewall
C) Screen Host Firewall
D) All of the above

6. The components of IP security includes .


A) Authentication Header (AH)
B) Encapsulating Security Payload (ESP)
C) Internet key Exchange (IKE)
D) All of the above

7. .. is used to carry traffic of one protocol over network that does not support
that protocol directly.
A) Tunneling
B) Transferring
C) Trafficking
D) Switching

8. In . Mode, the authentication header is inserted immediately after the IP header.


A) Tunnel
B) Transport
C) Authentication
D) Both A and B

9. State true or false.


i) Socks are a standard for circuit level gateways.
ii) The NAT is used for small number of the hosts in a private network.
A) True, False
B) False, True
C) True, True
D) False, False

10. A . is an extension of an enterprises private intranet across a public Network


such as the Internet across a public Network such as the Internet, creating a secure private
connection.
A) VNP
B) VPN
C) VSN
D) VSPN
Answers:
1. D) All i, ii, iii and iv 6. D) All of the above
2. A) Encryption 7. A) Tunneling
3. B) i, iii, iv and v only 8. A) Tunnel
4. A) Chock point 9. C) True, True
5. D) All of the above 10. B) VPN
1) What is preferred way of encryption ?
a) pre shared secret key
b) Using key distribution center (KDC)
c) public key-encryption
d) symmetric key
View Answer
Answer: c
Explanation: Preshared key can be compromised and either party can be suspected. Likewise
KDC or symmetric key can have breach which are undesirable. Public and private key
encryption is a known industry standard.
2) What is not a role of encryption ?
a) It is used to protect data from unauthorized access during transmission
b) It is used to ensure user authentication
c) It is used to ensure data integrity
d) It is used to ensure data corruption doesnt happens
View Answer
Answer: d
Explanation: Encryption doesnt have error correction or detection facility thus cannot be used to
safeguard from data corruption.
3) What is cipher-block chaining ?
a) Data is logically ANDed with previous block
b) Data is logically ORed with previous block
c) Data is logically XORed with previous block
d) none of the mentioned
View Answer
Answer: c
Explanation: None.
4) What is not an encryption standard ?
a) AES
b) TES
c) Triple DES
d) DES
View Answer
Answer: b
Explanation: None.
5) Which of following is not a stream cipher?
a) two fish
b) RC5
c) RC4
d) TBONE
View Answer
Answer: d
Explanation: None.
6) What is a Hash Function ?
a) It creates a small flexible block of data
b) It creates a small,fixed block of data
c) It creates a encrypted block of data
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
7) MD5 produces __ bits hash data ?
a) 128
b) 150
c) 160
d) 112
View Answer
Answer: a
Explanation: None.
8) SHA-1 produces __ bit of hash ?
a) 128
b) 160
c) 150
d) 112
View Answer
Answer: b
Explanation: None.
9) Which two of the following are authentication algorithms ?
a) MAC
b) AES
c) DES
d) Digital-signature
View Answer
Answer: a & c
Explanation: None.
10) What is role of Key Distribution Center ?
a) It is used to distribute keys to everyone in world
b) It intended to reduce the risks inherent in exchanging keys
c) a and b both
d) none of the mentioned
View Answer
Answer: b
Explanation: None.

Вам также может понравиться