Sample questions

Q1. Testing from an external network with no prior knowledge of the internal networks and systems is referred to as __________.

  1. Penetration Testing
  2. Gray box testing
  3. Black box testing
  4. Vulnerability assessment

Q2. The transport layer in the TCP/IP model does two things. One is to package the data given out by applications to a format that is suitable for transport over the network, and the other is to:

  1. Unpacking the data received from the network
  2. Transposition of data for networks
  3. Transformation data to binary format
  4. Encryption of data

Q3. The network or the internet layer in the TCP/IP model is for internet working. This layer has A group of:

  1. Methods
  2. Functions
  3. Protocols
  4. All of the above

Q4. Which one of the following services does Domain Name System Security Extensions (DNSSEC) not provide?

  1. Origin authentication
  2. Non-repudiation
  3. Data integrity
  4. Authenticated denial

Q5. Which check does Wired Equivalent Privacy (WEP) use for integrity assurance?

  1. CRC-12
  2. CRC-14
  3. CRC-28
  4. CRC-32

Q6. Kerberos provides which of the following:

  1. Authentication and authorization
  2. Authentication and encryption
  3. Authentication and accountability
  4. Authentication and availability

Q7. Biba model focuses on data integrity. A simple way to remember this model is:

  1. No read down and no write down
  2. No read up and no write up
  3. No read down and no write up
  4. No read up and no write down

Q8. A security mechanism to control the communication between entities that are labeled lower sensitive and high sensitive is known as what?

  1. Local security system
  2. Logical security guard
  3. Security tunnel
  4. Security rings

Q9. One of the popular methods to authenticate the sender using sender's public key is known as what?

  1. Public Key cryptography
  2. Digital certificate
  3. Digital signature
  4. Non-repudiation

Q10. Which one of the following is not a Denial-of-Service (DoS) attack?

  1. Teardrop
  2. Smurf
  3. SYN
  4. Sniffing

Q11. In a Trusted Computer System (TCS), which one of the following is a security mechanism that controls the communication between entities that are labeled as low sensitive and high sensitive?

  1. Security label
  2. Logical Security Guard
  3. Protection ring
  4. Security mode

Q12. Secret Key Cryptography is denoted as what?

  1. Asymmetric key encryption
  2. Symmetric key encryption
  3. Public Key Cryptography
  4. Private Key Cryptography

Q13. Domain Name System (DNS) maintains records to resolve host names to IP addresses. For faster resolving of addresses, the browser stores data of the resolved IP addresses in a temporary memory. Which of the following attacks could most likely compromise such a mechanism to redirect user request to illegitimate addresses?

  1. Spoofing
  2. Sniffing
  3. Cache poisoning
  4. Request forging

Q14. Identify the correct statements pertaining to the primary purpose of cryptography?

Sample questions

Q15. When a plaintext is Exclusively-ORed (XORed) with the previous block of ciphertext, then the mode is called what?

  1. Electronic Code Block
  2. Electronic Code Book
  3. Cipher Block Chaining
  4. Cipher Feedback
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.22.74.160