Sail E0 Webinar

MCQs

Total Questions : 69 | Page 2 of 7 pages
Question 11. What are zombie systems ?
  1.    Are specific system which are designed to attack by manufacturer
  2.    They are network of known hacking group
  3.    These systems are previously compromised, independent systems
  4.    None of the mentioned
 Discuss Question
Answer: Option C. -> These systems are previously compromised, independent systems


None.


Question 12. What is known as DOS attack ?
  1.    It is attack to block traffic of network
  2.    It is attack to harm contents stored in HDD by worm spawn processes
  3.    It is an attempt to make a machine or network resource unavailable.
  4.    None of the mentioned
 Discuss Question
Answer: Option C. -> It is an attempt to make a machine or network resource unavailable.


None.


Question 13. Which is not a valid port scan type ?
  1.    ACK scanning
  2.    Window scanning
  3.    IGMP scan
  4.    FIN scanning
 Discuss Question
Answer: Option C. -> IGMP scan


None.


Question 14. With regard to DOS attack what is not true from below options ?
  1.    We can stop DOS attack completely
  2.    By upgrading OS vulnerability we can stop DOS attack to some extent
  3.    DOS attack has to be stopped at network level
  4.    Suck attack can last for hours
 Discuss Question
Answer: Option A. -> We can stop DOS attack completely


None.


Question 15. What is not a important part of security protection ?
  1.    Large amount of RAM to support antivirus
  2.    Strong passwords
  3.    Audit log periodically
  4.    Scan for unauthorized programs in system directories
 Discuss Question
Answer: Option A. -> Large amount of RAM to support antivirus


RAM has no effect on security of a system. System's protection remains unchanged in increasing or decreasing amount of RAM.


Question 16. What is major drawback of anomaly detection IDS ?
  1.    These are very slow at detection
  2.    It generates many false alarms
  3.    It doesnt detect novel attacks
  4.    None of these
 Discuss Question
Answer: Option B. -> It generates many false alarms


None.


Question 17. What is cipher-block chaining ?
  1.    Data is logically 'ANDed' with previous block
  2.    Data is logically 'ORed' with previous block
  3.    Data is logically 'XORed' with previous block
  4.    none of the mentioned
 Discuss Question
Answer: Option C. -> Data is logically 'XORed' with previous block


None.


Question 18. What is not a role of encryption ?
  1.    It is used to protect data from unauthorized access during transmission
  2.    It is used to ensure user authentication
  3.    It is used to ensure data integrity
  4.    It is used to ensure data corruption doesn't happens
 Discuss Question
Answer: Option D. -> It is used to ensure data corruption doesn't happens


Encryption doesn't have error correction or detection facility thus cannot be used to safeguard from data corruption.


Question 19. What is preferred way of encryption ?
  1.    pre shared secret key
  2.    Using key distribution center (KDC)
  3.    public key-encryption
  4.    symmetric key
 Discuss Question
Answer: Option C. -> public key-encryption


None.


Question 20. What is not an encryption standard ?
  1.    AES
  2.    TES
  3.    Triple DES
  4.    DES
 Discuss Question
Answer: Option B. -> TES


None.


Latest Videos

Latest Test Papers