The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Online Technical Quiz Competition conducted by Prof. R. H. Rathod, Computer Eng. Deptt.
Questions and Answers
1.
Which of the following is independent malicious program that need not any host program?
A.
Trap doors
B.
Trojan horse
C.
Virus
D.
Worm
Correct Answer
D. Worm
Explanation A worm is an independent malicious program that can replicate itself and spread to other computers without the need for a host program. Unlike viruses, which require a host program to attach themselves to, worms can function independently and spread through networks or the internet. They can exploit vulnerabilities in operating systems or software to gain access to a computer and then use that access to propagate themselves to other machines. Worms can cause significant damage by consuming network bandwidth, deleting files, or installing backdoors for remote control.
Rate this question:
2.
Which of the following malicious program do not replicate automatically?
A.
Trojan Horse
B.
Worm
C.
Virus
D.
Zombie
Correct Answer
A. Trojan Horse
Explanation Trojan Horse is a type of malicious program that does not replicate automatically. Unlike viruses and worms, Trojan Horses do not have the ability to self-replicate and spread to other systems. Instead, they rely on social engineering techniques to trick users into executing them. Once executed, Trojan Horses can perform various malicious activities, such as stealing sensitive information or providing unauthorized access to the attacker. However, they do not have the ability to automatically replicate themselves like viruses or worms.
Rate this question:
3.
This logo is used by which company?
A.
Logitech
B.
Netscape
C.
LG
D.
AMD
Correct Answer
A. Logitech
Explanation The given logo is used by Logitech.
Rate this question:
4.
In ________ authentication, the claimant proves that she knows a secret without actually sending it.
A.
Password based
B.
Challenge response
C.
Encryption based
D.
None
Correct Answer
B. Challenge response
Explanation Challenge response authentication is a method where the claimant proves their identity by responding correctly to a challenge issued by the system. In this case, the claimant proves their knowledge of a secret without actually sending it. This method is commonly used in authentication protocols where the claimant needs to prove their identity without transmitting sensitive information over the network.
Rate this question:
5.
In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses.
A.
Message Authentication
B.
Message Confidentiality
C.
Entity Authentication
D.
None
Correct Answer
C. Entity Authentication
Explanation Entity Authentication is the correct answer because it refers to the process of proving one's identity to another entity. In this process, the claimant provides evidence or witnesses to verify her identity to the verifier. This can be done through various means such as presenting a government-issued ID, providing a password or PIN, or using biometric data. Entity Authentication ensures that the claimant is indeed who she claims to be, providing a level of trust and security in communication or transactions between entities.
Rate this question:
6.
Password-based authentication can be divided into two broad categories: _______ and _______.
A.
Fixed and Variable
B.
Fixed and One time
C.
Time stamped and Fixed
D.
None of the Above
Correct Answer
B. Fixed and One time
Explanation Password-based authentication can be divided into two broad categories: fixed and one-time. Fixed passwords are those that remain the same over a long period of time and are typically chosen by the user. One-time passwords, on the other hand, are temporary and can only be used for a single authentication session. These categories provide different levels of security and are used in different scenarios depending on the specific requirements of the system.
Rate this question:
7.
------------------- is the art of achieving security by encoding messages to make them non-readable
A.
Cryptography
B.
Cryptology
C.
Cryptanalysis
D.
None of the this
Correct Answer
A. CryptograpHy
Explanation Cryptography is the art of achieving security by encoding messages to make them non-readable. It involves using various techniques and algorithms to transform plain text into cipher text, which can only be deciphered by authorized individuals who possess the key. Cryptography ensures confidentiality and integrity of information by preventing unauthorized access and tampering. Cryptology is a broader term that encompasses both cryptography and cryptanalysis, which involves analyzing and breaking codes. Therefore, the correct answer is Cryptography.
Rate this question:
8.
There are two ways by which plain text message can be converted in to cipher text messages.....
A.
Substitution & Transposition
B.
Symmetric & Asymmetric
C.
Encryption & Decryption
D.
None of these
Correct Answer(s)
A. Substitution & Transposition
B. Symmetric & Asymmetric
Explanation The correct answer is Substitution & Transposition, Symmetric & Asymmetric. These are the two ways by which plain text messages can be converted into cipher text messages. Substitution involves replacing each letter or character in the message with a different letter or character according to a specific rule or key. Transposition, on the other hand, involves rearranging the letters or characters in the message to create a new order. Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses different keys for encryption and decryption.
Rate this question:
9.
The cipher message of the plain text “network security” is ……………………. When uses Caesar’s cipher
A.
Qhwzrun vhfxulwb
B.
Qhwavwr vhfxvmxc
C.
Qhwrvwx vhewulzf
D.
Qhwvwxr vhevwmae
Correct Answer
A. Qhwzrun vhfxulwb
Explanation The given cipher message "qhwzrun vhfxulwb" is the correct answer because it is the result of using Caesar's cipher on the plain text "network security". Caesar's cipher is a substitution cipher where each letter in the plain text is shifted a certain number of positions down the alphabet. In this case, each letter in "network security" has been shifted one position down the alphabet, resulting in "qhwzrun vhfxulwb".
Rate this question:
10.
The same key is used for encryption and decryption is known as ………………. Cryptography
A.
Asymmetric key
B.
Private key
C.
Symmetric key
D.
All of these
Correct Answer(s)
B. Private key C. Symmetric key
Explanation A private key is a type of symmetric key used for both encryption and decryption. In symmetric key cryptography, the same key is used for both processes. This means that the sender and receiver must have access to the same key in order to encrypt and decrypt the message. Private key cryptography is often used for secure communication between two parties who have previously shared the same key.
Rate this question:
11.
Unauthorized access and viruses are issues dealing with network …..
A.
Performance
B.
Reliability
C.
Security
D.
None of these
Correct Answer
C. Security
Explanation Unauthorized access and viruses are issues dealing with network security. Security measures are put in place to prevent unauthorized access to a network and to protect it from viruses, malware, and other malicious threats. These measures can include firewalls, encryption, authentication protocols, and antivirus software. By implementing strong security measures, organizations can ensure the confidentiality, integrity, and availability of their network and data.
Rate this question:
12.
The form of cryptography where pair of keys are used for encryption and decryption is known as ......
A.
Public key
B.
Private key
C.
Asymmetric key
D.
Symmetric key
Correct Answer(s)
A. Public key C. Asymmetric key
Explanation Public key cryptography, also known as asymmetric key cryptography, is a form of cryptography where a pair of keys (a public key and a private key) are used for encryption and decryption. The public key is shared with others, while the private key is kept secret. The public key is used to encrypt the message, and only the corresponding private key can decrypt it. This form of cryptography provides secure communication between two parties without the need to share a secret key beforehand.
Rate this question:
13.
Digital signatures are used to ……
1. Encrypt and secure the document 2. Authenticate the identity of sender
3. Not repudiate later by the sender
A.
1 and 2
B.
1 and 3
C.
2 and 3
D.
All 1 to 3
Correct Answer
C. 2 and 3
Explanation Digital signatures are used to authenticate the identity of the sender and ensure that the sender cannot later deny sending the document. They do not encrypt or secure the document itself, but rather provide a way to verify the integrity and authenticity of the document and its sender. Therefore, the correct answer is 2 and 3.
Rate this question:
14.
DES encrypts ……………… bit clear text blocks under the control of ………….. bit keys
A.
64 ; 56
B.
64 ; 48
C.
48 ; 32
D.
32 ; 32
Correct Answer
A. 64 ; 56
Explanation DES (Data Encryption Standard) is a symmetric encryption algorithm that operates on 64-bit blocks of plaintext. However, the key used in DES is actually 56 bits long, with the remaining 8 bits being used for error detection and parity checking. Therefore, the correct answer is 64 bits for the plaintext blocks and 56 bits for the keys.
Rate this question:
15.
In DES algorithm, 56 bit key can be obtained by
A.
Using 56 bit key
B.
Discarding every 8th bit of 64 bit key
C.
Adding 8th bit of 56 bit key
D.
None
Correct Answer
B. Discarding every 8th bit of 64 bit key
Explanation In the DES algorithm, a 64-bit key is initially used. However, to obtain a 56-bit key, every 8th bit of the original 64-bit key is discarded. This is done because the parity bits in the 64-bit key are not used in the encryption process. Therefore, by removing these bits, a 56-bit key is obtained which is used for the encryption and decryption operations in the DES algorithm.
Rate this question:
16.
Identify the cryptography technique........
A.
Symmetric key cryptography
B.
Asymmetric key cryptography
Correct Answer
B. Asymmetric key cryptograpHy
Explanation Asymmetric key cryptography is a type of cryptography technique where two different keys, a public key and a private key, are used for encryption and decryption. The public key is used for encryption and can be freely shared with others, while the private key is kept secret and used for decryption. This technique provides a secure way of communication as it ensures that only the intended recipient can decrypt the message using their private key.
Rate this question:
17.
What is the cipher text if the plain text message is “STAY AT HOME STAY SAFE” and the encryption algorithm used is simple columnar transposition technique with the key as VIRUS
A.
THTFAOAEAESYMYSTSA
B.
STSATHTFAOAEYMYAES
C.
THTFAOAESTSAAESYMY
D.
AOAESTSATHTFYMYAES
Correct Answer
A. THTFAOAEAESYMYSTSA
Explanation The given cipher text is obtained by applying the simple columnar transposition technique with the key "VIRUS" to the plain text message "STAY AT HOME STAY SAFE". The encryption algorithm rearranges the letters of the message by writing them in columns under the letters of the key, and then reading the columns in the order specified by the alphabetical order of the key. In this case, the columns are read in the order V-I-R-U-S, resulting in the cipher text "THTFAOAEAESYMYSTSA".
Rate this question:
18.
What is the cipher text if the plain text message is “HOW ARE YOU” and the encryption algorithm used is Vernam cipher (one time pad) technique with one time pad NCBTTZQARX [ Consider A=0 ]
A.
VRZURVZGS
B.
UQXTQUYFR
C.
TPWSPTXEQ
D.
WSZVSWAHT
Correct Answer
B. UQXTQUYFR
19.
Select the proper attributes of Firewall ___
A.
All the traffic should pass through the firewall
B.
The firewall should allow only authorized traffic
C.
The firewall itself can stop attacks
D.
The firewall should detect viruses
Correct Answer(s)
A. All the traffic should pass through the firewall
B. The firewall should allow only authorized traffic C. The firewall itself can stop attacks
Explanation The correct answer is a combination of the three attributes listed. All the traffic should pass through the firewall ensures that all network traffic is filtered and monitored by the firewall. The firewall should allow only authorized traffic ensures that only legitimate and approved traffic is allowed through the firewall. The firewall itself can stop attacks indicates that the firewall has built-in security measures to prevent and block malicious attacks.
Rate this question:
20.
Identify the configuration of firewall__
A.
Screened subnet firewall
B.
Screened Host Firewall, Dual-Homed Bastion
C.
Screened Host Firewall, Single-Homed Bastion
D.
None
Correct Answer
A. Screened subnet firewall
Explanation A screened subnet firewall is a type of firewall that is designed to protect a network by creating a separate subnet or network segment between the internal network and the external network. This configuration allows for more granular control over incoming and outgoing traffic, as well as providing an additional layer of security by isolating the internal network from the external network. It typically consists of a router, a screening router, and one or more screening hosts.
Rate this question:
21.
A packet filter firewall filters at __________
A.
Physical layer
B.
Data link layer
C.
Network layer or Transport layer
D.
Application layer
Correct Answer
C. Network layer or Transport layer
Explanation A packet filter firewall filters at the network layer or transport layer because these layers are responsible for handling the routing and delivery of packets in a network. By filtering at these layers, the firewall can inspect the packet headers and make decisions based on information such as source and destination IP addresses, port numbers, and protocol types. This allows the firewall to control the flow of network traffic and enforce security policies by allowing or blocking certain types of packets based on predefined rules.
Rate this question:
22.
A system that performs attack recognition and alerting for a network is what?
A.
HIDS
B.
NIDS
C.
Anomaly detection HIDS
D.
Signature-based NIDS
Correct Answer
B. NIDS
Explanation A system that performs attack recognition and alerting for a network is known as a Network Intrusion Detection System (NIDS). NIDS is designed to monitor network traffic and identify any suspicious or malicious activity that may indicate an attack. It uses various techniques such as anomaly detection and signature-based detection to identify potential threats and generate alerts to notify network administrators.
Rate this question:
23.
What are the characteristics of Host based IDS?
A.
The host operating system logs in the audit information
B.
Logs includes logins, file opens and program executions
C.
Logs are analyzed to detect tails of intrusion
D.
All of the mentioned
Correct Answer
D. All of the mentioned
Explanation Host based IDS refers to a type of intrusion detection system that is installed on individual host systems. It monitors and analyzes the audit information logged by the host operating system. This includes activities such as logins, file opens, and program executions. By analyzing these logs, the host based IDS is able to detect any suspicious or malicious activity that may indicate an intrusion. Therefore, all of the mentioned characteristics are true for host based IDS.
Rate this question:
24.
What are the drawbacks of the host based IDS?
A.
Unselective logging of messages may increase the audit burdens
B.
Selective logging runs the risk of missed attacks
C.
They are very fast to detect
D.
They have to be programmed for new patterns
Correct Answer
A. Unselective logging of messages may increase the audit burdens
Explanation The drawback of host-based IDS is that unselective logging of messages may increase the audit burdens. This means that the IDS may log a large number of messages, including irrelevant ones, which can make it difficult for auditors to sift through the logs and identify the important information. This can result in increased workload and potentially lead to missed or overlooked security incidents. Selective logging, on the other hand, runs the risk of missing attacks, but it can help in reducing the audit burden by only logging relevant events. Additionally, the speed of detection and the need for programming new patterns are not mentioned as drawbacks of host-based IDS in the given options.
Rate this question:
25.
What are characteristics of Network based IDS?
A.
They look for attack signatures in network traffic
B.
Filter decides which traffic will not be discarded or passed
C.
It is programmed to interpret a certain series of packet
D.
It models the normal usage of network as a noise characterization
Correct Answer
A. They look for attack signatures in network traffic
Explanation Network-based IDS (Intrusion Detection Systems) are designed to monitor and analyze network traffic in order to detect and prevent malicious activities. One of the key characteristics of network-based IDS is that they look for attack signatures in network traffic. This means that they are programmed to identify specific patterns or behaviors that are indicative of known attacks or security threats. By analyzing the network traffic and comparing it to a database of known attack signatures, the IDS can identify and alert administrators about any potential security breaches or unauthorized activities happening within the network.
Rate this question:
26.
A firewall protects which of the following attacks?
A.
Phishing
B.
Dumpster diving
C.
Denial of Service (DoS)
D.
Shoulder surfing
Correct Answer
C. Denial of Service (DoS)
Explanation A firewall protects against Denial of Service (DoS) attacks. A DoS attack is when an attacker overwhelms a system or network with a flood of illegitimate requests or traffic, causing it to become unavailable to legitimate users. A firewall can detect and block these malicious requests, preventing the system from being overwhelmed and ensuring that legitimate traffic can still access the network or system.
Rate this question:
27.
Firewall cannot protect against attacks that bypass the firewall_____
A.
True
B.
False
Correct Answer
A. True
Explanation A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. However, there are certain attacks that can bypass the firewall's protection. For example, attacks that originate from within the network or attacks that exploit vulnerabilities in the network infrastructure may not be detected or prevented by the firewall. Additionally, attacks that use encrypted communication or social engineering techniques can also bypass the firewall's defenses. Therefore, it is true that a firewall cannot fully protect against all types of attacks that can bypass its protection.
Rate this question:
28.
Kerberos is _______ protocol
A.
Authentication
B.
Authorization
C.
Encryption
D.
None
Correct Answer
A. Authentication
Explanation Kerberos is an authentication protocol used to verify the identity of users and services in a network. It provides a secure method for users to prove their identity to access resources and services. Through a series of exchanges involving tickets and encryption, Kerberos ensures that only authorized users can gain access to the network and its resources. It does not involve authorization or encryption directly, although it can be used in conjunction with other protocols to provide these functionalities.
Rate this question:
29.
Kerberos uses secret key cryptography.
A.
True
B.
False
Correct Answer
A. True
Explanation Kerberos is a network authentication protocol that uses secret key cryptography to securely authenticate users and services on a network. Secret key cryptography involves the use of a shared secret key between the client and the server to encrypt and decrypt messages. This ensures that only authorized parties with the correct secret key can access the network resources. Therefore, the statement "Kerberos uses secret key cryptography" is true.
Rate this question:
30.
Parties involved in Kerberos protocol are……
A.
User, AS, TGS, SS
B.
User, CA, TGT, SS
C.
User, CS, PGT, SS
D.
None
Correct Answer
A. User, AS, TGS, SS
Explanation The correct answer is User, AS, TGS, SS. In the Kerberos protocol, the User initiates the authentication process by requesting a ticket from the Authentication Server (AS). The AS then issues a Ticket Granting Ticket (TGT) to the User, which is used to request a Service Ticket (ST) from the Ticket Granting Server (TGS). The User presents the ST to the Service Server (SS) to gain access to the requested service. Therefore, the parties involved in the Kerberos protocol are the User, AS, TGS, and SS.
Rate this question:
31.
The idea of IPSec is to __________ the data packet and seal the __________layer and __________layer data during transmission
A.
Encrypt, Transport, Application
B.
Transport, Application, Network
C.
Transport, Datalink, Session
D.
None of this
Correct Answer
A. Encrypt, Transport, Application
Explanation IPSec is a protocol that provides secure communication over IP networks. It achieves this by encrypting the data packet, ensuring the confidentiality and integrity of the transmitted data. The encryption is done at the Application layer, where the data is transformed into a format that can only be read by the intended recipient. The sealed data is then transported securely over the network, ensuring that it cannot be tampered with or intercepted. Therefore, the correct answer is "Encrypt, Transport, Application".
Rate this question:
32.
The two modes of IPSec ________ & ________
Correct Answer Transport Tunnel
Explanation IPSec (Internet Protocol Security) is a protocol suite used to secure internet communications. It provides two modes of operation: Transport mode and Tunnel mode.
Transport mode is used to secure the communication between two end hosts. In this mode, only the payload (data) of the IP packet is encrypted and authenticated, while the IP header remains intact. It is typically used for securing end-to-end communication within a private network.
Tunnel mode, on the other hand, is used to secure communication between two networks. In this mode, the entire IP packet, including the IP header, is encapsulated within a new IP packet. This provides protection for the entire packet during transit between the networks.
Therefore, the correct answer is Transport, Tunnel.
Rate this question:
33.
The main two protocols of IPSec are ________ & ________
Correct Answer AH ESP
Explanation IPSec (Internet Protocol Security) is a framework of protocols used to secure internet communication. The two main protocols of IPSec are AH (Authentication Header) and ESP (Encapsulating Security Payload). AH provides data integrity, authentication, and protection against replay attacks. ESP, on the other hand, provides confidentiality, data integrity, and authentication. Both protocols work together to ensure secure and private communication over IP networks.
Rate this question:
34.
The full form of SMTP is …..
A.
Simple Mail Transmission Protocol
B.
Simple Mail Transfer Protocol
C.
Simple Mail Transaction Protocol
D.
None of this
Correct Answer
B. Simple Mail Transfer Protocol
Explanation SMTP stands for Simple Mail Transfer Protocol. It is a communication protocol used for sending and receiving email messages over a network. SMTP is responsible for the transmission of emails between mail servers. It allows the transfer of email messages from the sender's mail server to the recipient's mail server. This protocol is widely used in the email communication system and is essential for the proper functioning of email services.
Rate this question:
35.
PEM supports three main cryptographic functions--________, ________ & ________
Explanation PEM (Privacy Enhanced Mail) is a protocol that supports three main cryptographic functions: encryption, non-repudiation, and message integrity. Encryption ensures that the message is securely transmitted and can only be accessed by authorized recipients. Non-repudiation ensures that the sender cannot deny sending the message, providing evidence of its origin. Message integrity ensures that the message remains unchanged during transmission, preventing unauthorized modifications. These three functions work together to ensure the confidentiality, authenticity, and integrity of the messages exchanged using PEM.
Rate this question:
36.
In PEM operation, the 4 steps are.....
A.
Canonical conversion, digital signature, compression, enveloping
B.
Canonical conversion, digital signature, envelopingg, base 64 encoding
C.
Canonical conversion, digital signature, base 64 encoding, compression
D.
Canonical conversion, digital signature, encryption, base 64 encoding
Correct Answer
D. Canonical conversion, digital signature, encryption, base 64 encoding
37.
It is a stealing ideas or creations of others…..
A.
Plagiarism
B.
Intellectual property rights
C.
Piracy
D.
All of these
Correct Answer
D. All of these
Explanation The correct answer is "All of these" because all the options mentioned - plagiarism, intellectual property rights, and piracy - are related to stealing ideas or creations of others. Plagiarism refers to the act of using someone else's work without giving them proper credit, intellectual property rights protect the ownership and rights of creators, and piracy involves unauthorized copying or distribution of copyrighted material. Therefore, all these options encompass different aspects of the same concept.
Rate this question:
38.
Which of the following is digital certificate standard?
A.
X.508
B.
X.509
C.
D.509
D.
None of these
Correct Answer
B. X.509
Explanation X.509 is the correct answer because it is a widely used digital certificate standard. It defines the format for public key certificates, which are used to verify the authenticity and integrity of digital communications. X.508 and D.509 are not recognized standards for digital certificates, so they are not the correct answer.
Rate this question:
39.
Which of the following technique is used to verify the integrity of the message?
A.
Message digest
B.
Digital Signature
C.
Decryption algorithm
D.
All of these
Correct Answer
A. Message digest
Explanation A message digest is a technique used to verify the integrity of a message. It involves creating a unique hash value for the message using a cryptographic algorithm. This hash value is then compared with the recipient's copy of the message to ensure that it has not been tampered with during transmission. Digital signatures and decryption algorithms are not specifically used for verifying the integrity of a message.
Rate this question:
40.
The certificate authority signs the digital certificate with…
A.
Users public key
B.
Users private key
C.
Its own public key
D.
Its own private key
Correct Answer
D. Its own private key
Explanation The certificate authority signs the digital certificate with its own private key. This is because the certificate authority is responsible for verifying the authenticity and integrity of the digital certificate. By signing the certificate with its private key, the certificate authority ensures that the certificate has not been tampered with and can be trusted by others. The certificate can then be verified using the certificate authority's public key, which is widely available.
Rate this question:
41.
Identify the life cycle with full form of it.________
Correct Answer Information Technology Infrastructure Library
Explanation The correct answer is Information Technology Infrastructure Library (ITIL). ITIL is a framework that provides best practices for managing and delivering IT services. It consists of a set of guidelines and processes that help organizations align their IT services with their business goals. ITIL encompasses the entire life cycle of IT services, from strategy and design to transition, operation, and continual improvement.
Rate this question:
42.
What is backdoor ?
A.
A vulnerability in the software that allows someone to bypass the normal authentication process
B.
It is a known bug or exploit hackers use to cause software to behave in a way that was not intended by the manufacturer
C.
It is where viruses store their source code and begin to replicate
D.
It is a way for spyware to leave a system without any trace of it being there
Correct Answer
A. A vulnerability in the software that allows someone to bypass the normal authentication process
Explanation A backdoor refers to a vulnerability in software that enables someone to bypass the regular authentication process. This means that unauthorized individuals can gain access to a system or network without having to provide the necessary credentials or follow the usual security protocols. This can pose a significant security risk as it allows attackers to exploit the vulnerability and potentially gain control over the system, steal sensitive information, or carry out malicious activities. It is essential for software developers to identify and fix backdoors to ensure the integrity and security of their systems.
Rate this question:
43.
In public key encryption if A want to send an encrypted message to B then….
A.
A encrypts message using his /her private key
B.
A encrypts message using his /her public key
C.
A encrypts message using B’s private key
D.
A encrypts message using B’s public key
Correct Answer
D. A encrypts message using B’s public key
Explanation In public key encryption, if A wants to send an encrypted message to B, A encrypts the message using B's public key. This is because public key encryption uses a pair of keys: a public key and a private key. B's public key is available to everyone and is used for encryption, while B's private key is kept secret and is used for decryption. By encrypting the message using B's public key, only B will be able to decrypt it using their private key, ensuring the security and confidentiality of the message.
Rate this question:
44.
Which of the following is not an example of a computer as weapon cyber-crime?
A.
Credit card fraudulent
B.
Spying someone using keylogger
C.
IPR Violation
D.
None of the above
Correct Answer
B. Spying someone using keylogger
Explanation Spying someone using a keylogger is not an example of a computer as a weapon cyber-crime because a keylogger is a software or hardware device used to monitor and record keystrokes on a computer. While it can be used for malicious purposes, such as stealing personal information or login credentials, it does not involve using a computer as a weapon to cause harm or damage to others. Instead, it is a tool used for unauthorized surveillance or invasion of privacy.
Rate this question:
45.
What is the purpose of a Denial of Service attack?
A.
Exploit a weakness in the TCP/IP stack
B.
To execute a Trojan on a system
C.
To overload a system so it is no longer operational
D.
To shutdown services by turning them off
Correct Answer
C. To overload a system so it is no longer operational
Explanation A Denial of Service (DoS) attack is carried out with the intention of overwhelming a system or network, rendering it unable to function properly or provide services to legitimate users. By flooding the target system with a massive amount of traffic or requests, the attacker exhausts its resources, such as bandwidth, processing power, or memory, causing it to become unresponsive or crash. The purpose of a DoS attack is to disrupt the availability of the targeted system, rather than exploiting any specific vulnerability or gaining unauthorized access.
Rate this question:
46.
What is the name of the IT law that India is having in the Indian legislature?
A.
India’s Technology (IT) Act, 2000
B.
India’s Digital Information Technology (DIT) Act, 2000
C.
India’s Information Technology (IT) Act, 2000
D.
The Technology Act, 2008
Correct Answer
C. India’s Information Technology (IT) Act, 2000
Explanation India's Information Technology (IT) Act, 2000 is the correct answer because it is the law that governs electronic commerce and digital signatures in India. It provides legal recognition for electronic transactions, regulates the use of digital signatures, and establishes the framework for cybersecurity in the country. The act was enacted to facilitate e-governance, promote electronic commerce, and ensure the security and confidentiality of electronic records and communications.
Rate this question:
47.
What is meant by the term 'cyber-crime'?
A.
Any crime that uses computers to jeopardise or attempt to jeopardise national security
B.
Any crime that involves computers and networks
C.
The use of computer networks to commit financial or identity fraud
D.
The theft of digital information
Correct Answer
A. Any crime that uses computers to jeopardise or attempt to jeopardise national security
Explanation The term 'cyber-crime' refers to any crime that uses computers to jeopardize or attempt to jeopardize national security. This can include activities such as hacking into government systems, launching cyber-attacks on critical infrastructure, or stealing classified information. The focus is on crimes that have the potential to cause significant harm to a country's security and stability, and that are facilitated through the use of computers and technology.
Rate this question:
48.
The feature of Control Objectives for Information and Related Technology (COBIT) is….
A.
It is a supporting toolset that allows managers to bridge the gap between control requirements, technical issues and business risks.
B.
Cobit components include a framework to organize IT governance objectives and good practices by IT domains and processes, and link them to business requirements.
C.
Process descriptions provide a reference process model and common language for everyone in an organization.
D.
All of this
Correct Answer
D. All of this
Explanation The feature of Control Objectives for Information and Related Technology (COBIT) includes all of the mentioned components. It is a supporting toolset that helps managers in bridging the gap between control requirements, technical issues, and business risks. COBIT provides a framework to organize IT governance objectives and good practices, linking them to business requirements. It also offers process descriptions, which serve as a reference process model and a common language for everyone in an organization. Therefore, the correct answer is "All of this."
Rate this question:
49.
Following are the four basic for security
1.Confidentiality 2.Integrity 3.Avaliability 4.Accountability
A.
True
B.
False
Correct Answer
A. True
Explanation The given answer is true because confidentiality, integrity, availability, and accountability are indeed the four basic principles of security. Confidentiality ensures that information is only accessible to authorized individuals. Integrity ensures that information is accurate and has not been tampered with. Availability ensures that information and resources are accessible when needed. Accountability ensures that individuals are responsible for their actions and can be traced back if necessary. These principles form the foundation of a secure system or network.
Rate this question:
50.
Is [ISMS long form is Information Security Manaement System ] true or false?
A.
True
B.
False
Correct Answer
A. True
Explanation The statement "ISMS long form is Information Security Management System" is true. ISMS stands for Information Security Management System, which is a framework of policies and procedures for managing an organization's information security risks. Therefore, the given statement is correct.
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.