Sail E0 Webinar

MCQs

Total Questions : 69 | Page 3 of 7 pages
Question 21. Which of following is not a stream cipher?
  1.    twofish
  2.    RC5
  3.    RC4
  4.    TBONE
 Discuss Question
Answer: Option D. -> TBONE


None.


Question 22. What is role of Key Distribution Center ?
  1.    It is used to distribute keys to everyone in world
  2.    It intended to reduce the risks inherent in exchanging keys
  3.    a and b both
  4.    none of the mentioned
 Discuss Question
Answer: Option B. -> It intended to reduce the risks inherent in exchanging keys


None.


Question 23. MD5 produces __ bits hash data ?
  1.    128
  2.    150
  3.    160
  4.    112
 Discuss Question
Answer: Option A. -> 128


None.


Question 24. What is a Hash Function ?
  1.    It creates a small flexible block of data
  2.    It creates a small,fixed block of data
  3.    It creates a encrypted block of data
  4.    none of the mentioned
 Discuss Question
Answer: Option B. -> It creates a small,fixed block of data


None.


Question 25. SHA-1 produces __ bit of hash ?
  1.    128
  2.    160
  3.    150
  4.    112
 Discuss Question
Answer: Option B. -> 160


None.


Question 26. Which of the following are forms of malicious attack ?
  1.    Theft of information
  2.    Modification of data
  3.    Wiping of information
  4.    All of the mentioned
 Discuss Question
Answer: Option D. -> All of the mentioned


None.


Question 27. Which of the following is a good practice ?
  1.    Give full permission for remote transferring
  2.    Grant read only permission
  3.    Grant limited permission to specified account
  4.    Give both read and write permission but not execute.
 Discuss Question
Answer: Option C. -> Grant limited permission to specified account


limited access is a key method to circumvent unauthorized access and exploits.


Question 28. From the following, which is not a common file permission ?
  1.    Write
  2.    Execute
  3.    Stop
  4.    Read
 Discuss Question
Answer: Option C. -> Stop


None.


Question 29. What are common security threats ?
  1.    File Shredding
  2.    File sharing and permission
  3.    File corrupting
  4.    File integrity
 Discuss Question
Answer: Option B. -> File sharing and permission


Sharing and associated permissions are usual exploits which can compromised the system.


Question 30. What is not a good practice for user administration ?
  1.    Isolating a system after a compromise
  2.    Perform random auditing procedures
  3.    Granting privileges on a per host basis
  4.    Using telnet and FTP for remote access.
 Discuss Question
Answer: Option D. -> Using telnet and FTP for remote access.


Telnet and FTP are not encrypted and can be compromised.


Latest Videos

Latest Test Papers