Online Technical Quiz (Nis)

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rajendra Rathod
R
Rajendra Rathod
Community Contributor
Quizzes Created: 1 | Total Attempts: 106
Questions: 50 | Attempts: 106

SettingsSettingsSettings
Online Technical Quiz (Nis) - Quiz

Online Technical Quiz Competition conducted by Prof. R. H. Rathod, Computer Eng. Deptt.


Questions and Answers
  • 1. 

    Which of the following is independent malicious program that need not any host program?

    • A.

      Trap doors

    • B.

      Trojan horse

    • C.

      Virus

    • D.

      Worm

    Correct Answer
    D. Worm
    Explanation
    A worm is an independent malicious program that can replicate itself and spread to other computers without the need for a host program. Unlike viruses, which require a host program to attach themselves to, worms can function independently and spread through networks or the internet. They can exploit vulnerabilities in operating systems or software to gain access to a computer and then use that access to propagate themselves to other machines. Worms can cause significant damage by consuming network bandwidth, deleting files, or installing backdoors for remote control.

    Rate this question:

  • 2. 

    Which of the following malicious program do not replicate automatically?

    • A.

      Trojan Horse

    • B.

      Worm

    • C.

      Virus

    • D.

      Zombie

    Correct Answer
    A. Trojan Horse
    Explanation
    Trojan Horse is a type of malicious program that does not replicate automatically. Unlike viruses and worms, Trojan Horses do not have the ability to self-replicate and spread to other systems. Instead, they rely on social engineering techniques to trick users into executing them. Once executed, Trojan Horses can perform various malicious activities, such as stealing sensitive information or providing unauthorized access to the attacker. However, they do not have the ability to automatically replicate themselves like viruses or worms.

    Rate this question:

  • 3. 

    This logo is used by which company? 

    • A.

      Logitech

    • B.

      Netscape

    • C.

      LG

    • D.

      AMD

    Correct Answer
    A. Logitech
    Explanation
    The given logo is used by Logitech.

    Rate this question:

  • 4. 

    In ________ authentication, the claimant proves that she knows a secret without actually sending it.

    • A.

      Password based

    • B.

      Challenge response

    • C.

      Encryption based

    • D.

      None

    Correct Answer
    B. Challenge response
    Explanation
    Challenge response authentication is a method where the claimant proves their identity by responding correctly to a challenge issued by the system. In this case, the claimant proves their knowledge of a secret without actually sending it. This method is commonly used in authentication protocols where the claimant needs to prove their identity without transmitting sensitive information over the network.

    Rate this question:

  • 5. 

    In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses.

    • A.

      Message Authentication

    • B.

      Message Confidentiality

    • C.

      Entity Authentication

    • D.

      None

    Correct Answer
    C. Entity Authentication
    Explanation
    Entity Authentication is the correct answer because it refers to the process of proving one's identity to another entity. In this process, the claimant provides evidence or witnesses to verify her identity to the verifier. This can be done through various means such as presenting a government-issued ID, providing a password or PIN, or using biometric data. Entity Authentication ensures that the claimant is indeed who she claims to be, providing a level of trust and security in communication or transactions between entities.

    Rate this question:

  • 6. 

    Password-based authentication can be divided into two broad categories: _______ and _______.

    • A.

      Fixed and Variable

    • B.

      Fixed and One time

    • C.

      Time stamped and Fixed

    • D.

      None of the Above

    Correct Answer
    B. Fixed and One time
    Explanation
    Password-based authentication can be divided into two broad categories: fixed and one-time. Fixed passwords are those that remain the same over a long period of time and are typically chosen by the user. One-time passwords, on the other hand, are temporary and can only be used for a single authentication session. These categories provide different levels of security and are used in different scenarios depending on the specific requirements of the system.

    Rate this question:

  • 7. 

    ------------------- is the art of achieving security by encoding messages to make them non-readable

    • A.

      Cryptography

    • B.

      Cryptology

    • C.

      Cryptanalysis

    • D.

      None of the this

    Correct Answer
    A. CryptograpHy
    Explanation
    Cryptography is the art of achieving security by encoding messages to make them non-readable. It involves using various techniques and algorithms to transform plain text into cipher text, which can only be deciphered by authorized individuals who possess the key. Cryptography ensures confidentiality and integrity of information by preventing unauthorized access and tampering. Cryptology is a broader term that encompasses both cryptography and cryptanalysis, which involves analyzing and breaking codes. Therefore, the correct answer is Cryptography.

    Rate this question:

  • 8. 

    There are two ways by which plain text message can be converted in to cipher text messages.....

    • A.

      Substitution & Transposition

    • B.

      Symmetric & Asymmetric

    • C.

      Encryption & Decryption

    • D.

      None of these

    Correct Answer(s)
    A. Substitution & Transposition
    B. Symmetric & Asymmetric
    Explanation
    The correct answer is Substitution & Transposition, Symmetric & Asymmetric. These are the two ways by which plain text messages can be converted into cipher text messages. Substitution involves replacing each letter or character in the message with a different letter or character according to a specific rule or key. Transposition, on the other hand, involves rearranging the letters or characters in the message to create a new order. Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses different keys for encryption and decryption.

    Rate this question:

  • 9. 

    The cipher message of the plain text “network security” is ……………………. When uses Caesar’s cipher

    • A.

      Qhwzrun vhfxulwb

    • B.

      Qhwavwr vhfxvmxc

    • C.

      Qhwrvwx vhewulzf

    • D.

      Qhwvwxr vhevwmae

    Correct Answer
    A. Qhwzrun vhfxulwb
    Explanation
    The given cipher message "qhwzrun vhfxulwb" is the correct answer because it is the result of using Caesar's cipher on the plain text "network security". Caesar's cipher is a substitution cipher where each letter in the plain text is shifted a certain number of positions down the alphabet. In this case, each letter in "network security" has been shifted one position down the alphabet, resulting in "qhwzrun vhfxulwb".

    Rate this question:

  • 10. 

    The same key is used for encryption and decryption is known as ………………. Cryptography

    • A.

      Asymmetric key

    • B.

      Private key

    • C.

      Symmetric key

    • D.

      All of these

    Correct Answer(s)
    B. Private key
    C. Symmetric key
    Explanation
    A private key is a type of symmetric key used for both encryption and decryption. In symmetric key cryptography, the same key is used for both processes. This means that the sender and receiver must have access to the same key in order to encrypt and decrypt the message. Private key cryptography is often used for secure communication between two parties who have previously shared the same key.

    Rate this question:

  • 11. 

    Unauthorized access and viruses are issues dealing  with network …..

    • A.

      Performance       

    • B.

      Reliability

    • C.

      Security

    • D.

      None of these

    Correct Answer
    C. Security
    Explanation
    Unauthorized access and viruses are issues dealing with network security. Security measures are put in place to prevent unauthorized access to a network and to protect it from viruses, malware, and other malicious threats. These measures can include firewalls, encryption, authentication protocols, and antivirus software. By implementing strong security measures, organizations can ensure the confidentiality, integrity, and availability of their network and data.

    Rate this question:

  • 12. 

    The form of cryptography where pair of keys are used for encryption and decryption is known as ......

    • A.

      Public key

    • B.

      Private key

    • C.

      Asymmetric key 

    • D.

      Symmetric key

    Correct Answer(s)
    A. Public key
    C. Asymmetric key 
    Explanation
    Public key cryptography, also known as asymmetric key cryptography, is a form of cryptography where a pair of keys (a public key and a private key) are used for encryption and decryption. The public key is shared with others, while the private key is kept secret. The public key is used to encrypt the message, and only the corresponding private key can decrypt it. This form of cryptography provides secure communication between two parties without the need to share a secret key beforehand.

    Rate this question:

  • 13. 

    Digital signatures are used to ……                                   1. Encrypt and secure the document     2. Authenticate the identity of sender    3. Not repudiate later by the sender

    • A.

      1 and 2

    • B.

      1 and 3

    • C.

      2 and 3

    • D.

      All 1 to 3

    Correct Answer
    C. 2 and 3
    Explanation
    Digital signatures are used to authenticate the identity of the sender and ensure that the sender cannot later deny sending the document. They do not encrypt or secure the document itself, but rather provide a way to verify the integrity and authenticity of the document and its sender. Therefore, the correct answer is 2 and 3.

    Rate this question:

  • 14. 

    DES  encrypts ……………… bit clear text blocks under the control of ………….. bit keys

    • A.

      64 ; 56

    • B.

      64 ; 48

    • C.

      48 ; 32

    • D.

      32 ; 32

    Correct Answer
    A. 64 ; 56
    Explanation
    DES (Data Encryption Standard) is a symmetric encryption algorithm that operates on 64-bit blocks of plaintext. However, the key used in DES is actually 56 bits long, with the remaining 8 bits being used for error detection and parity checking. Therefore, the correct answer is 64 bits for the plaintext blocks and 56 bits for the keys.

    Rate this question:

  • 15. 

    In DES algorithm, 56 bit key can be obtained by

    • A.

      Using 56 bit key

    • B.

      Discarding every 8th bit of 64 bit key

    • C.

      Adding 8th bit of 56 bit key

    • D.

      None

    Correct Answer
    B. Discarding every 8th bit of 64 bit key
    Explanation
    In the DES algorithm, a 64-bit key is initially used. However, to obtain a 56-bit key, every 8th bit of the original 64-bit key is discarded. This is done because the parity bits in the 64-bit key are not used in the encryption process. Therefore, by removing these bits, a 56-bit key is obtained which is used for the encryption and decryption operations in the DES algorithm.

    Rate this question:

  • 16. 

    Identify the cryptography technique........

    • A.

      Symmetric key cryptography

    • B.

      Asymmetric key cryptography

    Correct Answer
    B. Asymmetric key cryptograpHy
    Explanation
    Asymmetric key cryptography is a type of cryptography technique where two different keys, a public key and a private key, are used for encryption and decryption. The public key is used for encryption and can be freely shared with others, while the private key is kept secret and used for decryption. This technique provides a secure way of communication as it ensures that only the intended recipient can decrypt the message using their private key.

    Rate this question:

  • 17. 

    What is the cipher text if the plain text message is “STAY AT HOME STAY SAFE” and the encryption algorithm used is simple columnar transposition technique with the key as VIRUS

    • A.

      THTFAOAEAESYMYSTSA

    • B.

      STSATHTFAOAEYMYAES

    • C.

      THTFAOAESTSAAESYMY

    • D.

      AOAESTSATHTFYMYAES

    Correct Answer
    A. THTFAOAEAESYMYSTSA
    Explanation
    The given cipher text is obtained by applying the simple columnar transposition technique with the key "VIRUS" to the plain text message "STAY AT HOME STAY SAFE". The encryption algorithm rearranges the letters of the message by writing them in columns under the letters of the key, and then reading the columns in the order specified by the alphabetical order of the key. In this case, the columns are read in the order V-I-R-U-S, resulting in the cipher text "THTFAOAEAESYMYSTSA".

    Rate this question:

  • 18. 

    What is the cipher text if the plain text message is “HOW ARE YOU” and the encryption algorithm used is Vernam cipher (one time pad) technique with one time pad NCBTTZQARX   [  Consider  A=0 ]

    • A.

      VRZURVZGS

    • B.

      UQXTQUYFR

    • C.

      TPWSPTXEQ

    • D.

      WSZVSWAHT

    Correct Answer
    B. UQXTQUYFR
  • 19. 

    Select the proper attributes of Firewall ___

    • A.

      All the traffic should pass through the firewall

    • B.

      The firewall should allow only authorized traffic

    • C.

      The firewall itself can stop attacks

    • D.

      The firewall should detect viruses

    Correct Answer(s)
    A. All the traffic should pass through the firewall
    B. The firewall should allow only authorized traffic
    C. The firewall itself can stop attacks
    Explanation
    The correct answer is a combination of the three attributes listed. All the traffic should pass through the firewall ensures that all network traffic is filtered and monitored by the firewall. The firewall should allow only authorized traffic ensures that only legitimate and approved traffic is allowed through the firewall. The firewall itself can stop attacks indicates that the firewall has built-in security measures to prevent and block malicious attacks.

    Rate this question:

  • 20. 

    Identify the configuration of firewall__

    • A.

      Screened subnet firewall

    • B.

      Screened Host Firewall, Dual-Homed Bastion

    • C.

      Screened Host Firewall, Single-Homed Bastion

    • D.

      None

    Correct Answer
    A. Screened subnet firewall
    Explanation
    A screened subnet firewall is a type of firewall that is designed to protect a network by creating a separate subnet or network segment between the internal network and the external network. This configuration allows for more granular control over incoming and outgoing traffic, as well as providing an additional layer of security by isolating the internal network from the external network. It typically consists of a router, a screening router, and one or more screening hosts.

    Rate this question:

  • 21. 

    A packet filter firewall filters at __________

    • A.

      Physical layer

    • B.

      Data link layer

    • C.

      Network layer or Transport layer

    • D.

      Application layer

    Correct Answer
    C. Network layer or Transport layer
    Explanation
    A packet filter firewall filters at the network layer or transport layer because these layers are responsible for handling the routing and delivery of packets in a network. By filtering at these layers, the firewall can inspect the packet headers and make decisions based on information such as source and destination IP addresses, port numbers, and protocol types. This allows the firewall to control the flow of network traffic and enforce security policies by allowing or blocking certain types of packets based on predefined rules.

    Rate this question:

  • 22. 

    A system that performs attack recognition and alerting for a network is what?

    • A.

      HIDS         

    • B.

      NIDS

    • C.

      Anomaly detection HIDS

    • D.

      Signature-based NIDS

    Correct Answer
    B. NIDS
    Explanation
    A system that performs attack recognition and alerting for a network is known as a Network Intrusion Detection System (NIDS). NIDS is designed to monitor network traffic and identify any suspicious or malicious activity that may indicate an attack. It uses various techniques such as anomaly detection and signature-based detection to identify potential threats and generate alerts to notify network administrators.

    Rate this question:

  • 23. 

    What are the characteristics of Host based IDS?

    • A.

      The host operating system logs in the audit information

    • B.

      Logs includes logins, file opens and program executions

    • C.

      Logs are analyzed to detect tails of intrusion

    • D.

      All of the mentioned

    Correct Answer
    D. All of the mentioned
    Explanation
    Host based IDS refers to a type of intrusion detection system that is installed on individual host systems. It monitors and analyzes the audit information logged by the host operating system. This includes activities such as logins, file opens, and program executions. By analyzing these logs, the host based IDS is able to detect any suspicious or malicious activity that may indicate an intrusion. Therefore, all of the mentioned characteristics are true for host based IDS.

    Rate this question:

  • 24. 

    What are the drawbacks of the host based IDS?

    • A.

      Unselective logging of messages may increase the audit burdens

    • B.

      Selective logging runs the risk of missed attacks

    • C.

      They are very fast to detect

    • D.

      They have to be programmed for new patterns

    Correct Answer
    A. Unselective logging of messages may increase the audit burdens
    Explanation
    The drawback of host-based IDS is that unselective logging of messages may increase the audit burdens. This means that the IDS may log a large number of messages, including irrelevant ones, which can make it difficult for auditors to sift through the logs and identify the important information. This can result in increased workload and potentially lead to missed or overlooked security incidents. Selective logging, on the other hand, runs the risk of missing attacks, but it can help in reducing the audit burden by only logging relevant events. Additionally, the speed of detection and the need for programming new patterns are not mentioned as drawbacks of host-based IDS in the given options.

    Rate this question:

  • 25. 

    What are characteristics of Network based IDS?

    • A.

      They look for attack signatures in network traffic

    • B.

      Filter decides which traffic will not be discarded or passed

    • C.

      It is programmed to interpret a certain series of packet

    • D.

      It models the normal usage of network as a noise characterization

    Correct Answer
    A. They look for attack signatures in network traffic
    Explanation
    Network-based IDS (Intrusion Detection Systems) are designed to monitor and analyze network traffic in order to detect and prevent malicious activities. One of the key characteristics of network-based IDS is that they look for attack signatures in network traffic. This means that they are programmed to identify specific patterns or behaviors that are indicative of known attacks or security threats. By analyzing the network traffic and comparing it to a database of known attack signatures, the IDS can identify and alert administrators about any potential security breaches or unauthorized activities happening within the network.

    Rate this question:

  • 26. 

    A firewall protects which of the following attacks?

    • A.

      Phishing

    • B.

      Dumpster diving

    • C.

      Denial of Service (DoS)

    • D.

      Shoulder surfing

    Correct Answer
    C. Denial of Service (DoS)
    Explanation
    A firewall protects against Denial of Service (DoS) attacks. A DoS attack is when an attacker overwhelms a system or network with a flood of illegitimate requests or traffic, causing it to become unavailable to legitimate users. A firewall can detect and block these malicious requests, preventing the system from being overwhelmed and ensuring that legitimate traffic can still access the network or system.

    Rate this question:

  • 27. 

    Firewall cannot protect against attacks that bypass the firewall_____

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. However, there are certain attacks that can bypass the firewall's protection. For example, attacks that originate from within the network or attacks that exploit vulnerabilities in the network infrastructure may not be detected or prevented by the firewall. Additionally, attacks that use encrypted communication or social engineering techniques can also bypass the firewall's defenses. Therefore, it is true that a firewall cannot fully protect against all types of attacks that can bypass its protection.

    Rate this question:

  • 28. 

    Kerberos is _______ protocol

    • A.

      Authentication

    • B.

      Authorization

    • C.

      Encryption

    • D.

      None

    Correct Answer
    A. Authentication
    Explanation
    Kerberos is an authentication protocol used to verify the identity of users and services in a network. It provides a secure method for users to prove their identity to access resources and services. Through a series of exchanges involving tickets and encryption, Kerberos ensures that only authorized users can gain access to the network and its resources. It does not involve authorization or encryption directly, although it can be used in conjunction with other protocols to provide these functionalities.

    Rate this question:

  • 29. 

    Kerberos uses  secret key cryptography.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Kerberos is a network authentication protocol that uses secret key cryptography to securely authenticate users and services on a network. Secret key cryptography involves the use of a shared secret key between the client and the server to encrypt and decrypt messages. This ensures that only authorized parties with the correct secret key can access the network resources. Therefore, the statement "Kerberos uses secret key cryptography" is true.

    Rate this question:

  • 30. 

    Parties involved in Kerberos protocol are……

    • A.

      User, AS, TGS, SS

    • B.

      User, CA, TGT, SS

    • C.

      User, CS, PGT, SS

    • D.

      None

    Correct Answer
    A. User, AS, TGS, SS
    Explanation
    The correct answer is User, AS, TGS, SS. In the Kerberos protocol, the User initiates the authentication process by requesting a ticket from the Authentication Server (AS). The AS then issues a Ticket Granting Ticket (TGT) to the User, which is used to request a Service Ticket (ST) from the Ticket Granting Server (TGS). The User presents the ST to the Service Server (SS) to gain access to the requested service. Therefore, the parties involved in the Kerberos protocol are the User, AS, TGS, and SS.

    Rate this question:

  • 31. 

    The idea of IPSec is to __________  the data packet and seal the __________layer and __________layer data during transmission

    • A.

      Encrypt, Transport, Application

    • B.

      Transport, Application, Network

    • C.

      Transport, Datalink, Session

    • D.

      None of this

    Correct Answer
    A. Encrypt, Transport, Application
    Explanation
    IPSec is a protocol that provides secure communication over IP networks. It achieves this by encrypting the data packet, ensuring the confidentiality and integrity of the transmitted data. The encryption is done at the Application layer, where the data is transformed into a format that can only be read by the intended recipient. The sealed data is then transported securely over the network, ensuring that it cannot be tampered with or intercepted. Therefore, the correct answer is "Encrypt, Transport, Application".

    Rate this question:

  • 32. 

    The two modes of IPSec ________ & ________

    Correct Answer
    Transport
    Tunnel
    Explanation
    IPSec (Internet Protocol Security) is a protocol suite used to secure internet communications. It provides two modes of operation: Transport mode and Tunnel mode.

    Transport mode is used to secure the communication between two end hosts. In this mode, only the payload (data) of the IP packet is encrypted and authenticated, while the IP header remains intact. It is typically used for securing end-to-end communication within a private network.

    Tunnel mode, on the other hand, is used to secure communication between two networks. In this mode, the entire IP packet, including the IP header, is encapsulated within a new IP packet. This provides protection for the entire packet during transit between the networks.

    Therefore, the correct answer is Transport, Tunnel.

    Rate this question:

  • 33. 

    The main two protocols of IPSec are ________ & ________

    Correct Answer
    AH
    ESP
    Explanation
    IPSec (Internet Protocol Security) is a framework of protocols used to secure internet communication. The two main protocols of IPSec are AH (Authentication Header) and ESP (Encapsulating Security Payload). AH provides data integrity, authentication, and protection against replay attacks. ESP, on the other hand, provides confidentiality, data integrity, and authentication. Both protocols work together to ensure secure and private communication over IP networks.

    Rate this question:

  • 34. 

    The full form of SMTP is …..

    • A.

      Simple Mail Transmission Protocol

    • B.

      Simple Mail Transfer Protocol

    • C.

      Simple Mail Transaction Protocol

    • D.

      None of this

    Correct Answer
    B. Simple Mail Transfer Protocol
    Explanation
    SMTP stands for Simple Mail Transfer Protocol. It is a communication protocol used for sending and receiving email messages over a network. SMTP is responsible for the transmission of emails between mail servers. It allows the transfer of email messages from the sender's mail server to the recipient's mail server. This protocol is widely used in the email communication system and is essential for the proper functioning of email services.

    Rate this question:

  • 35. 

    PEM supports three main cryptographic functions--________, ________ & ________

    Correct Answer
    Encryption
    Non-repudiation
    Message integrity
    Explanation
    PEM (Privacy Enhanced Mail) is a protocol that supports three main cryptographic functions: encryption, non-repudiation, and message integrity. Encryption ensures that the message is securely transmitted and can only be accessed by authorized recipients. Non-repudiation ensures that the sender cannot deny sending the message, providing evidence of its origin. Message integrity ensures that the message remains unchanged during transmission, preventing unauthorized modifications. These three functions work together to ensure the confidentiality, authenticity, and integrity of the messages exchanged using PEM.

    Rate this question:

  • 36. 

    In PEM operation, the 4 steps are.....

    • A.

      Canonical conversion, digital signature, compression, enveloping

    • B.

      Canonical conversion, digital signature, envelopingg, base 64 encoding

    • C.

      Canonical conversion, digital signature, base 64 encoding, compression

    • D.

      Canonical conversion, digital signature, encryption, base 64 encoding

    Correct Answer
    D. Canonical conversion, digital signature, encryption, base 64 encoding
  • 37. 

    It is a stealing ideas or creations of others…..

    • A.

      Plagiarism

    • B.

      Intellectual property rights

    • C.

      Piracy

    • D.

      All of these

    Correct Answer
    D. All of these
    Explanation
    The correct answer is "All of these" because all the options mentioned - plagiarism, intellectual property rights, and piracy - are related to stealing ideas or creations of others. Plagiarism refers to the act of using someone else's work without giving them proper credit, intellectual property rights protect the ownership and rights of creators, and piracy involves unauthorized copying or distribution of copyrighted material. Therefore, all these options encompass different aspects of the same concept.

    Rate this question:

  • 38. 

    Which of the following is digital certificate standard?

    • A.

      X.508        

    • B.

      X.509

    • C.

      D.509

    • D.

      None of these

    Correct Answer
    B. X.509
    Explanation
    X.509 is the correct answer because it is a widely used digital certificate standard. It defines the format for public key certificates, which are used to verify the authenticity and integrity of digital communications. X.508 and D.509 are not recognized standards for digital certificates, so they are not the correct answer.

    Rate this question:

  • 39. 

    Which of the following technique is used to verify the integrity of the message?

    • A.

      Message digest

    • B.

      Digital Signature

    • C.

      Decryption algorithm

    • D.

      All of these

    Correct Answer
    A. Message digest
    Explanation
    A message digest is a technique used to verify the integrity of a message. It involves creating a unique hash value for the message using a cryptographic algorithm. This hash value is then compared with the recipient's copy of the message to ensure that it has not been tampered with during transmission. Digital signatures and decryption algorithms are not specifically used for verifying the integrity of a message.

    Rate this question:

  • 40. 

    The certificate authority signs the digital certificate with…

    • A.

      Users public key

    • B.

      Users private key

    • C.

      Its own public key

    • D.

      Its own private key

    Correct Answer
    D. Its own private key
    Explanation
    The certificate authority signs the digital certificate with its own private key. This is because the certificate authority is responsible for verifying the authenticity and integrity of the digital certificate. By signing the certificate with its private key, the certificate authority ensures that the certificate has not been tampered with and can be trusted by others. The certificate can then be verified using the certificate authority's public key, which is widely available.

    Rate this question:

  • 41. 

    Identify the life cycle with full form of it.________

    Correct Answer
    Information Technology Infrastructure Library
    Explanation
    The correct answer is Information Technology Infrastructure Library (ITIL). ITIL is a framework that provides best practices for managing and delivering IT services. It consists of a set of guidelines and processes that help organizations align their IT services with their business goals. ITIL encompasses the entire life cycle of IT services, from strategy and design to transition, operation, and continual improvement.

    Rate this question:

  • 42. 

    What is backdoor ?

    • A.

      A vulnerability in the software that allows someone to bypass the normal authentication process

    • B.

      It is a known bug  or exploit hackers use to cause software to behave in a way that was not intended by the manufacturer

    • C.

      It is where viruses store their source code and begin to replicate

    • D.

      It is a way for spyware to leave a system without any trace of it being there

    Correct Answer
    A. A vulnerability in the software that allows someone to bypass the normal authentication process
    Explanation
    A backdoor refers to a vulnerability in software that enables someone to bypass the regular authentication process. This means that unauthorized individuals can gain access to a system or network without having to provide the necessary credentials or follow the usual security protocols. This can pose a significant security risk as it allows attackers to exploit the vulnerability and potentially gain control over the system, steal sensitive information, or carry out malicious activities. It is essential for software developers to identify and fix backdoors to ensure the integrity and security of their systems.

    Rate this question:

  • 43. 

    In public key encryption if A want to send an encrypted message to B then….

    • A.

      A encrypts message using his /her private key

    • B.

      A encrypts message using his /her public key

    • C.

      A encrypts message using B’s private key

    • D.

      A encrypts message using B’s public key

    Correct Answer
    D. A encrypts message using B’s public key
    Explanation
    In public key encryption, if A wants to send an encrypted message to B, A encrypts the message using B's public key. This is because public key encryption uses a pair of keys: a public key and a private key. B's public key is available to everyone and is used for encryption, while B's private key is kept secret and is used for decryption. By encrypting the message using B's public key, only B will be able to decrypt it using their private key, ensuring the security and confidentiality of the message.

    Rate this question:

  • 44. 

    Which of the following is not an example of a computer as weapon cyber-crime?

    • A.

      Credit card fraudulent

    • B.

      Spying someone using keylogger

    • C.

      IPR Violation

    • D.

      None of the above

    Correct Answer
    B. Spying someone using keylogger
    Explanation
    Spying someone using a keylogger is not an example of a computer as a weapon cyber-crime because a keylogger is a software or hardware device used to monitor and record keystrokes on a computer. While it can be used for malicious purposes, such as stealing personal information or login credentials, it does not involve using a computer as a weapon to cause harm or damage to others. Instead, it is a tool used for unauthorized surveillance or invasion of privacy.

    Rate this question:

  • 45. 

    What is the purpose of a Denial of Service attack?

    • A.

      Exploit a weakness in the TCP/IP stack

    • B.

      To execute a Trojan on a system

    • C.

      To overload a system so it is no longer operational

    • D.

      To shutdown services by turning them off

    Correct Answer
    C. To overload a system so it is no longer operational
    Explanation
    A Denial of Service (DoS) attack is carried out with the intention of overwhelming a system or network, rendering it unable to function properly or provide services to legitimate users. By flooding the target system with a massive amount of traffic or requests, the attacker exhausts its resources, such as bandwidth, processing power, or memory, causing it to become unresponsive or crash. The purpose of a DoS attack is to disrupt the availability of the targeted system, rather than exploiting any specific vulnerability or gaining unauthorized access.

    Rate this question:

  • 46. 

    What is the name of the IT law that India is having in the Indian legislature?

    • A.

      India’s Technology (IT) Act, 2000

    • B.

      India’s Digital Information Technology (DIT) Act, 2000

    • C.

      India’s Information Technology (IT) Act, 2000

    • D.

      The Technology Act, 2008

    Correct Answer
    C. India’s Information Technology (IT) Act, 2000
    Explanation
    India's Information Technology (IT) Act, 2000 is the correct answer because it is the law that governs electronic commerce and digital signatures in India. It provides legal recognition for electronic transactions, regulates the use of digital signatures, and establishes the framework for cybersecurity in the country. The act was enacted to facilitate e-governance, promote electronic commerce, and ensure the security and confidentiality of electronic records and communications.

    Rate this question:

  • 47. 

    What is meant by the term 'cyber-crime'?

    • A.

      Any crime that uses computers to jeopardise or attempt to jeopardise national security

    • B.

      Any crime that involves computers and networks

    • C.

      The use of computer networks to commit financial or identity fraud

    • D.

      The theft of digital information

    Correct Answer
    A. Any crime that uses computers to jeopardise or attempt to jeopardise national security
    Explanation
    The term 'cyber-crime' refers to any crime that uses computers to jeopardize or attempt to jeopardize national security. This can include activities such as hacking into government systems, launching cyber-attacks on critical infrastructure, or stealing classified information. The focus is on crimes that have the potential to cause significant harm to a country's security and stability, and that are facilitated through the use of computers and technology.

    Rate this question:

  • 48. 

    The feature of Control Objectives for Information and Related Technology (COBIT) is….

    • A.

      It is a supporting toolset that allows managers to bridge the gap between control requirements, technical issues and business risks.

    • B.

      Cobit components include a framework to organize IT governance objectives and good practices by IT domains and processes, and link them to business requirements.

    • C.

      Process descriptions provide a reference process model and common language for everyone in an organization.

    • D.

      All of this

    Correct Answer
    D. All of this
    Explanation
    The feature of Control Objectives for Information and Related Technology (COBIT) includes all of the mentioned components. It is a supporting toolset that helps managers in bridging the gap between control requirements, technical issues, and business risks. COBIT provides a framework to organize IT governance objectives and good practices, linking them to business requirements. It also offers process descriptions, which serve as a reference process model and a common language for everyone in an organization. Therefore, the correct answer is "All of this."

    Rate this question:

  • 49. 

    Following are the four basic for security 1.Confidentiality   2.Integrity    3.Avaliability    4.Accountability

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The given answer is true because confidentiality, integrity, availability, and accountability are indeed the four basic principles of security. Confidentiality ensures that information is only accessible to authorized individuals. Integrity ensures that information is accurate and has not been tampered with. Availability ensures that information and resources are accessible when needed. Accountability ensures that individuals are responsible for their actions and can be traced back if necessary. These principles form the foundation of a secure system or network.

    Rate this question:

  • 50. 

    Is [ISMS long form is Information Security Manaement System ] true or false?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement "ISMS long form is Information Security Management System" is true. ISMS stands for Information Security Management System, which is a framework of policies and procedures for managing an organization's information security risks. Therefore, the given statement is correct.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 30, 2020
    Quiz Created by
    Rajendra Rathod
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.