Sail E0 Webinar

MCQs

Total Questions : 69 | Page 4 of 7 pages
Question 31. Which of the following is least secure method of authentication ?
  1.    Key card
  2.    fingerprint
  3.    retina pattern
  4.    Password
 Discuss Question
Answer: Option D. -> Password


Passwords can be be compromised more easily than to replicate a physical thing like key card, fingerprint or retina.


Question 32. What does Light Directory Access Protocol (LDAP) doesn't store ?
  1.    Users
  2.    Address
  3.    Passwords
  4.    Security Keys
 Discuss Question
Answer: Option B. -> Address


None.


Question 33. Why is one time password safe ?
  1.    It is easy to generated
  2.    It cannot be shared
  3.    It is different for every access
  4.    It is a complex enctypted password
 Discuss Question
Answer: Option C. -> It is different for every access


One time password is safe since it is generated per access and thus cannot be brute forced or deduced.


Question 34. Which of the following is a strong password ?
  1.    19thAugust88
  2.    Delhi88
  3.    P@assw0rd
  4.    !augustdelhi
 Discuss Question
Answer: Option C. -> P@assw0rd


It has a combination of Alphabet both capital and small along with number and special character. Thus always use complex password with combination of all these.


Question 35. What is characteristic of RADIUS system ?
  1.    It is essential for centralized encryption and authentication
  2.    It works on Network layer to deny access to unauthorized people
  3.    It provides centralized authentication mechanism via network devices
  4.    It's a strong File access system.
 Discuss Question
Answer: Option C. -> It provides centralized authentication mechanism via network devices


None.


Question 36. What is breach of availability ?
  1.    This type of violation involves unauthorized reading of data
  2.    This violation involves unauthorized modification of data.
  3.    This violation involves unauthorized destruction of data
  4.    This violation involves unauthorized use of resources
 Discuss Question
Answer: Option C. -> This violation involves unauthorized destruction of data


None.


Question 37. What is trap door ?
  1.    IT is trap door in WarGames
  2.    It is a hole in software left by designer.
  3.    It is a Trojan horse
  4.    It is a virus which traps and locks user terminal
 Discuss Question
Answer: Option B. -> It is a hole in software left by designer.


None.


Question 38. What is Trojan horse ?
  1.    IT a useful way to encrypt password
  2.    It is a user which steals valuable information
  3.    It is a rogue program which tricks users
  4.    It's a brute force attack algorithm.
 Discuss Question
Answer: Option C. -> It is a rogue program which tricks users


None.


Question 39. What is theft of service ?
  1.    This type of violation involves unauthorized reading of data
  2.    This violation involves unauthorized modification of data.
  3.    This violation involves unauthorized destruction of data
  4.    This violation involves unauthorized use of resources
 Discuss Question
Answer: Option D. -> This violation involves unauthorized use of resources


None.


Question 40. What is breach of confidentiality ?
  1.    This type of violation involves unauthorized reading of data
  2.    This violation involves unauthorized modification of data.
  3.    This violation involves unauthorized destruction of data
  4.    This violation involves unauthorized use of resources
 Discuss Question
Answer: Option A. -> This type of violation involves unauthorized reading of data


None.


Latest Videos

Latest Test Papers