Network Information Security NIS
Network Information Security NIS
Question
The field that covers a variety of computer networks, both public and private,
that are used in everyday jobs.
a) Artificial Intelligence
b) ML
c) Network Security
d) IT
Question
Question
Question
Question
Question
Security features that control that can access resources in the OS.
a) Authentication
b) Identification
c) Validation
d) Access control
Question
Question
The information that gets transformed in encryption is ____________
a) Plain text
b) Parallel text
c) Encrypted text
d) Decrypted text
Question
Question
From the options below, which of them is not a threat to information security?
a) Disaster
b) Eavesdropping
c) Information leakage
d) Unchanged default password
Question
Question
_____ platforms are used for safety and protection of information in the cloud.
a) Cloud workload protection platforms
b) Cloud security protocols
c) AWS
d) One Drive
Question
Question
Question
_______ technology is used for analyzing and monitoring traffic in network and
information flow.
a) Cloud access security brokers (CASBs)
b) Managed detection and response (MDR)
c) Network Security Firewall
d) Network traffic analysis (NTA)
Question
Question
Question
Question
Question
Question
Question
Question
In mid-1981, the 1st virus for Apple computers with the name _________ came
into existence.
a) Apple I
b) Apple II
c) Apple III
d) Apple Virus
Question
The virus hides itself from getting detected by ______ different ways.
a) 2
b) 3
c) 4
d) 5
Question
Question
________________ gets installed & stays hidden in your computer’s memory.
It stays involved to the specific type of files which it infects.
a) Boot Sector Virus
b) Direct Action Virus
c) Polymorphic Virus
d) Multipartite Virus
Question
Question
Which of the below-mentioned reasons do not satisfy the reason why people
create a computer virus?
a) Research purpose
b) Pranks
c) Identity theft
d) Protection
Question
Question
The internal code of any software that will set of a malicious function when
specified conditions are met, is called _____________
a) logic bomb
b) trap door
c) code stacker
d) none of the mentioned
Question
Question
Which one of the following is a process that uses the spawn mechanism to
revage the system performance?
a) worm
b) trojan
c) threat
d) virus
Question
Question
Which one of the following is not an attack, but a search for vulnerabilities to
attack?
a) denial of service
b) port scanning
c) memory access violation
d) dumpster diving
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Find the set of quadratic residues in the set –
Z11* = { 1, 2, 3, 4, 5, 6, 7, 8, 9, 10}
a) QR set = {1, 2, 4, 5, 9} of Z11*
b) QR set = {1, 3, 6, 5, 9} of Z11*
c) QR set = {1, 3, 4, 9,10} of Z11*
d) QR set = {1, 3, 4, 5, 9} of Z11*
Question
Question
Question
Communication between end systems is encrypted using a key, often known as
a) temporary key
b) section key
c) line key
d) session key
Question
Question
Question
Question
Which is the last step in establishing a connection between hosts using the
SSM?
a) Interaction/ Handshaking between the SSM and the KDC
b) Establishment of the connection
c) Release of connection request packet
d) SSM saves the packet and applies to the KDC for connection permission
Question
Question
firewall is installed at the point where the secure internal network and
untrusted external network meet which is also known as __________
a) Chock point
b) Meeting point
c) Firewall point
d) Secure point
Question
Question
Question
A packet filter firewall filters at __________
a) Physical layer
b) Data link layer
c) Network layer or Transport layer
d) Application layer
Question
Question
What tells a firewall how to reassemble a data stream that has been divided
into packets?
a) The source routing feature
b) The number in the header’s identification field
c) The destination IP address
d) The header checksum field in the packet header
Question
A stateful firewall maintains a ___________ which is a list of active
connections.
a) Routing table
b) Bridging table
c) State table
d) Connection table
Question
Question
Question
In tunnel mode, IPSec protects the ______
a) Entire IP packet
b) IP header
c) IP payload
d) IP trailer
Question
Question
Question
Question
Question
Question
Question
When a DNS server accepts and uses incorrect information from a host that has no
authority giving that information, then it is called _________
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) DNS authorizing
Question
Question
Question
Question
If a website uses a cookie, or a browser contains the cookie, then every time you
visit that website, the browser transfers the cookie to that website.
a) True
b) False
Question
The stored cookie which contains all your personal data about that website can be
stolen away by _____________ using _____________ or trojans.
a) attackers, malware
b) hackers, antivirus
c) penetration testers, malware
d) penetration testers, virus
Question
If the data stored in the _____________ is not encrypted, then after cookie
stealing, attackers can see information such as username and password stored by
the cookie.
a) memory
b) quarantine
c) cookies
d) hard drive
Question
Question
Question
_____________ is the technique used for tricking users to disclose their username
and passwords through fake pages.
a) Social Engineering
b) Phishing
c) Cookie Stealing
d) Banner Grabbing
Question
Using email hacking illicit hackers can send & spread ___________ virus
_____________ and spam emails.
a) trojans, redirected malicious URLs
b) antivirus, patches
c) cracked software, redirected malicious URLs
d) malware, security patches
Question
Question
Fraudulent email messages are some fake email messages that seem legitimate
which ask for your bank details and reply those emails with updated confidential
information.
a) True
b) False
Question
Fraudulent email messages are some fake email messages that seem legitimate
which asks for your confidential bank details such as _____________ details
_________ and passwords.
a) credit card, antivirus name
b) credit card, login ID
c) cell phone, antivirus name
d) car model, account ID
Question
Question
Question
Question
Question
Question
What is the name of the IT law that India is having in the Indian legislature?
a) India’s Technology (IT) Act, 2000
b) India’s Digital Information Technology (DIT) Act, 2000
c) India’s Information Technology (IT) Act, 2000
d) The Technology Act, 2008
Question
Question
Question
The Information Technology Act -2000 bill was passed by K. R. Narayanan.
a) True
b) False
Question
Under which section of IT Act, stealing any digital asset or information is written a
cyber-crime.
a) 65
b) 65-D
c) 67
d) 70
Question
What is the punishment in India for stealing computer documents, assets or any
software’s source code from any organization, individual, or from any other
means?
a) 6 months of imprisonment and a fine of Rs. 50,000
b) 1 year of imprisonment and a fine of Rs. 100,000
c) 2 years of imprisonment and a fine of Rs. 250,000
d) 3 years of imprisonment and a fine of Rs. 500,000
Question
Question
Question
What type of cyber-crime, its laws and punishments does section 66 of the Indian
IT Act holds?
a) Cracking or illegally hack into any system
b) Putting antivirus into the victim
c) Stealing data
d) Stealing hardware components