csi-604 information secuirty pastpaper mcqs and answers



 

  1. Q1: In which of the following, a person is constantly followed/chased by another person or group of several peoples?

    • Answer: Stalking
  2. Q2: Which of the following is considered as the unsolicited commercial email?

    • Answer: Spam
  3. Q3: _____ is a type of software designed to help the user's computer detect viruses and avoid them.

    • Answer: Antivirus
  4. Q4: Which one of the following is a type of antivirus program?

    • Answer: All of the above (Norton, McAfee, Kaspersky)
  5. Q5: It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. It is known as the  

    • Answer: Firewall
  6. Q6: Which of the following refers to the violation of the principle if a computer is no more accessible?

    • Answer: Availability
  7. Q7: To protect the computer from a virus, one must keep _____ on in the computer system.

    • Answer: Antivirus
  8. Q8: In CIA, C stands for:

    • Answer: Confidentiality
  9. Q9: In CIA, I stands for:

    • Answer: Integrity
  10. Q10: In CIA, A stands for:

  • Answer: Availability
  1. Q11: Symmetric encryption uses _____ key(s):
  • Answer: One
  1. Q12: A-Symmetric encryption uses _____ key(s):
  • Answer: Two
  1. Q13: Encryption algorithm is used to transform plaintext into:
  • Answer: Cipher Text
  1. Q14: Which one of the following is also referred to as malicious software?
  • Answer: Malware
  1. Q15: The encryption techniques are primarily used for improving the:
  • Answer: Security
  1. Q16: SSL stands for:
  • Answer: Secure Socket Layer
  1. Q17: ECC stands for:
  • Answer: Elliptic Curve Cryptography
  1. Q18: SAAS stands for:
  • Answer: Software as a Service
  1. Q19: PAAS stands for:
  • Answer: Platform as a Service
  • Q1: Which of the following is defined as an attempt to steal, spy, damage, or destroy computer systems, networks, or their associated information?

    • Answer: Cyber-attack  
  • Q2: Which of the following is not a cybercrime?

    • Answer: Malware
  • Q3: Which of the following is a type of cyber-attack?

    • Answer: All of the above (Phishing, SQL Injections, Password Attack)
  • Q4: Which of the following is defined as an attempt to harm, damage, or cause a threat to a system or network?

    • Answer: Cyber Attack
  • Q5: Which of the following online service's privacy cannot be protected using Tor?

    • Answer: Browsing data
  • Q6: Which of the following is the least strong security encryption standard?

    • Answer: WEP
  • Q7: Which of the following can diminish the chance of data leakage?

    • Answer: Cryptography
  • Q8: A malicious hacker can gain access illegally to a system if the system is not properly tested in the scanning and gaining access phase.

    • Answer: True
  • Q9: In which phase, the hackers install backdoors so that his/her ownership with the victim's system can be retained later?

    • Answer: Maintaining Access
  • Q10: Which of the following is the tool used for this purpose?

    • Answer: Nmap
    1. Q11: The scrambled message produced as output is:
    • Answer: Cipher Text
    1. Q12: The most important symmetric algorithm, all of which are block ciphers, are the DES, triple DES, and the:
    • Answer: AES
    1. Q13: On average, _____ of all possible keys must be tried in order to achieve success with a brute-force attack.
    • Answer: Half
    1. Q14: The purpose of a hash function is to produce a "fingerprint" of a:
    • Answer: File, message, or block of data
    1. Q15: SHA is a:
    • Answer: Hash function
    1. Q16: What data should be subject to a data classification scheme?
    • Answer: All data
    1. Q17: The original message or data that is fed into the algorithm is:
    • Answer: Plain Text
    1. Q18: The decryption algorithm is the encryption algorithm run in inverse.
    • Answer: True
    1. Q19: Transmitted data stored locally are referred to as:
    • Answer: Data at rest
    1. Q20: Digital signatures and key management are the two most important applications of:
    • Answer: Public Key

No comments:

Post a Comment