Sail E0 Webinar

MCQs

Total Questions : 69 | Page 1 of 7 pages
Question 1. Which happens first authorization or authentication ?
  1.    Authorization
  2.    Authentication
  3.    Both are same
  4.    None of the mentioned
 Discuss Question
Answer: Option A. -> Authorization


None.


Question 2. What is breach of integrity ?
  1.    This type of violation involves unauthorized reading of data
  2.    This violation involves unauthorized modification of data.
  3.    This violation involves unauthorized destruction of data
  4.    This violation involves unauthorized use of resources
 Discuss Question
Answer: Option B. -> This violation involves unauthorized modification of data.


None.


Question 3. What is characteristics of Authorization ?
  1.    RADIUS and RSA
  2.    3 way handshaking with syn and fin.
  3.    Multilayered protection for securing resources
  4.    Deals with privileges and rights
 Discuss Question
Answer: Option D. -> Deals with privileges and rights


None.


Question 4. What is not a best practice for password policy ?
  1.    Deciding maximum age of password
  2.    Restriction on password reuse and history
  3.    Password encryption
  4.    Having change password every 2 years.
 Discuss Question
Answer: Option D. -> Having change password every 2 years.


Old passwords are more vulnerable to being misplaced or compromised. Passwords should be changed periodically to enhance security.


Question 5. What forces the user to change password at first logon ?
  1.    Default behavior of OS
  2.    Part of AES encryption practice
  3.    Devices being accessed forces the user
  4.    Account administrator
 Discuss Question
Answer: Option D. -> Account administrator


Its administrator's job to ensure that password of the user remains private and is known only to user. But while making a new user account he assigns a random general password to give it to user. Thus even administrator cannot access a particular users account.


Question 6. Which mechanism is used by worm process ?
  1.    Trap door
  2.    Fake process
  3.    Spawn Process
  4.    VAX process
 Discuss Question
Answer: Option C. -> Spawn Process


None.


Question 7. What is known as masquerading ?
  1.    When one participant in communication pretends to be someone else.
  2.    When attacker modifies data in communication
  3.    When attack is of fraudulent repeat of a valid data
  4.    When attack gains access to remote systems.
 Discuss Question
Answer: Option A. -> When one participant in communication pretends to be someone else.


None.


Question 8. Who unleashed famous worm attack in 1988 which effected UNIX systems and caused losses in millions ?
  1.    Robert Morris
  2.    Bob Milano
  3.    Mark zuckerberg
  4.    Bill Gates
 Discuss Question
Answer: Option A. -> Robert Morris


None.


Question 9. What is port scanning ?
  1.    It is a software used to scan system for attack
  2.    It is a software application designed to probe a server or host for open ports
  3.    It is software used to scan system for introducing attacks by brute force
  4.    None of the mentioned
 Discuss Question
Answer: Option B. -> It is a software application designed to probe a server or host for open ports


None.


Question 10. Which is not a port scan type ?
  1.    TCP scanning
  2.    SYN scanning
  3.    UDP scanning
  4.    SYSTEM Scanning
 Discuss Question
Answer: Option D. -> SYSTEM Scanning


None.


Latest Videos

Latest Test Papers