GkSeries.com

Cyber Security Multiple Choice Questions and Answers | Cyber Security MCQs and Answers

(1) Firewall as part of a router program
[A] filters only packets coming from internet
[B] filters only packets going to internet
[C] filters packets travelling from and to the intranet from the internet
[D] ensures rapid traffic of packets for speedy e-Commerce
Answer: filters packets travelling from and to the intranet from the internet
(2) A firewall may be implemented in
[A] routers which connect intranet to internet
[B] bridges used in an intranet
[C] expensive modem
[D] user’s application programs
Answer: routers which connect intranet to internet

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

(3) A firewall is a
[A] wall built to prevent fires from damaging a corporate intranet
[B] security device deployed at the boundary of a company to prevent unauthorized physical access
[C] security device deployed at the boundary of a corporate intranet to protect it from unauthorized access
[D] device to prevent all accesses from the internet to the corporate intranet
Answer: security device deployed at the boundary of a corporate intranet to protect it from unauthorized access
(4) By security in e-Commerce we mean

(i) Protecting an organization’s data resource from unauthorized access

(ii)Preventing disasters from happening

(iii) Authenticating messages received by an organization

(iv) Protecting messages sent on the internet from being read and understood by unauthorized persons/organizations

[A] i, ii
[B] ii, iii
[C] iii, iv
[D] i, iii, iv
Answer: i, iii, iv
(5) EDI (Electronic Data Interchange) standard
[A] is not easily available
[B] defines several hundred transaction sets for various business forms
[C] is not popular
[D] defines only a transmission protocol
Answer: defines several hundred transaction sets for various business forms
(6) For secure EDI (Electronic Data Interchange) transmission on internet
[A] MIME is used
[B] S/MIME is used
[C] PGP is used
[D] TCP/IP is used
Answer: S/MIME is used
(7) . EDI (Electronic Data Interchange) over internet uses
[A] MIME to attach EDI forms to e-mail messages
[B] FTP to send business forms
[C] HTTP to send business forms
[D] SGML to send business forms
Answer: MIME to attach EDI forms to e-mail messages
(8) EDI (Electronic Data Interchange) use
[A] requires an extranet
[B] requires value added network
[C] can be done on internet
[D] requires a corporate intranet
Answer: can be done on internet
(9) What Security tradeoff occurs while using IDS (Intrusion Detection System)?
[A] Change in permission
[B] Login Failures
[C] Change in privilege
[D] Performance degradation
Answer: Performance degradation
(10) A company requires each employee to power off his computer at the end of the day. This rule was implemented to make the network _______
[A] perform better
[B] more reliable
[C] more secure
[D] more error-free
Answer: more secure
(11) By symmetric key encryption we mean
[A] one private key is used for both encryption and decryption
[B] private and public key used are symmetric
[C] only public keys are used for encryption
[D] only symmetric key is used for encryption
Answer: one private key is used for both encryption and decryption
(12) The following ciphertext was received. The plaintext was permuted using permutation (34152) and substitution. Substitute character by character +3 (A Æ D, etc). The plain text after decryption is: Cipher text :PDLJDLXHVQC
[A] MAIGAIUESNZ
[B] IAMAGENIUSZ
[C] LDPDJHPLXVZ
[D] IAMAGENIUSC
Answer: IAMAGENIUSZ
(13) By applying permutation (31254) and substitution by 5 characters away from current character (A Æ F , B Æ G etc..) the following string ABRACADABRA becomes
[A] FGWCAAADRBF
[B] RABCAAADRBF
[C] WFGHFFFIWGF
[D] None of the above
Answer: WFGHFFFIWGF
(14) Encryption can be done
[A] only on textual data
[B] only on ASCII coded data
[C] on any bit string
[D] only on mnemonic data
Answer: on any bit string
(15) Encryption is required to

(i) protect business information from eavesdropping when it is transmitted on internet

(ii) efficiently use the bandwidth available in PSTN

(iii) to protect information stored in companies’ databases from retrieval

(iv) to preserve secrecy of information stored in databases if an unauthorized person retrieves it

[A] i and ii
[B] ii and iii
[C] iii and iv
[D] i and iv
Answer: i and iv
(16) By encryption of a text we mean
[A] compressing it
[B] expanding it
[C] scrambling it to preserve its security
[D] hashing it
Answer: scrambling it to preserve its security
(17) A hardened firewall host on an Intranet is
[A] a software which runs in any of the computers in the intranet
[B] a software which runs on a special reserved computer on the intranet
[C] a stripped down computer connected to the intanet
[D] a mainframe connected to the intranet to ensure security
Answer: a software which runs on a special reserved computer on the intranet
(18) A hardened firewall host on an intranet

(i) has a proxy application gateway program running on it

(ii)Allows specified internet users to access specified services in the intranet

(iii) Initiates all internet activities requested by clients and monitors them

(iv) prevents outsiders from accessing IP addresses within the intranet

[A] i, ii
[B] i, ii, iii
[C] i, ii, iii, iv
[D] ii, iii, iv
Answer: i, ii, iii, iv
(19) Proxy application gateway

(i) acts on behalf of all intranet users wanting to access internet securely

(ii)monitors all accesses to internet and allows access to only specified IP addresses

(iii) disallows use of certain protocols with security problems

(iv) disallows all internet users from accessing intranet

[A] i, ii
[B] i, ii, iii
[C] i, ii, iii, iv
[D] ii, iii, iv
Answer: i, ii, iii
(20) Main function of proxy application gateway firewall is
[A] to allow corporate users to use efficiently all internet services
[B] to allow intranet users to securely use specified internet services
[C] to allow corporate users to use all internet services
[D] to prevent corporate users from using internet services
Answer: to allow intranet users to securely use specified internet services

Please share this page

Click Here to Read more questions

Teacher Eligibility Test