Quiznetik

Information Cyber Security (ICS) | Set 1

1. In the _______ mode, IPSec protects the whole IP packet, including the original IP header.

Correct : B. tunnel

2. An HTTP connection uses port _________ whereas HTTPS uses port ____________ and invokes SSL

Correct : C. 80; 443

3. What port does Telnet use?

Correct : D. 23

4. A digital Signature is

Correct : C. an authentication of an electronic record by trying it uniquely to a key only a sender knows

5. A ___________ is an extension of an enterprise’s private intranet across a public network such as the internet, creating a secure private connection.

Correct : B. vpn

6. ______uses the idea of certificate trust levels

Correct : B. pgp

7. A digital signature needs a

Correct : C. public-key system

8. Pretty good privacy (PGP) is used in ______

Correct : B. email security

9. What is necessary for a cross-site script attack with cookies to be thwarted

Correct : A. captchas

10. The _______ mode is normally used when we need host-to-host (end-to-end) protection of data.

Correct : A. transport

11. For each _______ the Kerberos Key Distribution Center (KDC) maintains a database of the realm’s principal and the principal’s associated “secret keys”.

Correct : B. realm

12. The basic Web Services platform is combination of _____ and _______

Correct : C. xml + http

13. For a client-server authentication, the client requests from the KDC a ________ for access to a specific asset.

Correct : A. ticket

14. What is one advantage of setting up a DMZ with two firewalls?

Correct : C. you can do load balancing

15. What are the two primary classifications of cross-site scripting?

Correct : D. non-persistent and persistent

16. Imagine a social networking web app (like Twitter) that allows users to post short blurbs of text.

Correct : D. a and b

17. Why would a hacker use a proxy server?

Correct : D. to hide malicious activity on the network.

18. IPSec is designed to provide security at the _________

Correct : B. network layer

19. Which component is included in IP security?

Correct : D. all of the mentioned

20. What is Firewall?

Correct : A. firewalls are network based security measures that control the flow of incoming and outgoing traffic

21. SSL stands for?

Correct : A. secured socket layer

22. What is the most important activity in system hacking?

Correct : B. cracking passwords

23. Why would HTTP Tunneling be used?

Correct : C. to bypass a firewall

24. The domain name space (tree) is devided into---------different sections

Correct : A. 3

25. The _____domains define registered hosts according to their generic behaviour.

Correct : A. generic

26. DNS can use services of________using the well known port 53

Correct : C. either (a) or (b)

27. In the DNS the names are defined in _____ sturucture

Correct : B. an invertred tree

28. The root of DNS tree is____

Correct : C. an empty string

29. A full domain name is sequence of lables seperated by____

Correct : B. dots

30. When discussing IDS/IPS, what is a signature?

Correct : B. patterns of activity or code corresponding to attacks

31. Which is true of a signature-based IDS?

Correct : B. it only identifies on known signatures

32. A false positive can be defined as:

Correct : A. an alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior

33. The features of traditional IPSes are found in all of these modern systems, except:

Correct : B. antimalware

34. How does machine learning benefit IDSes/IPSes?

Correct : C. by searching for similar patterns to known attacks

35. A valid definition of digital evidence is:

Correct : C. digital data of probative value

36. What are the three general categories of computer systems that can contain digital evidence?

Correct : D. open computer systems, communication systems, embedded systems

37. In terms of digital evidence, the Internet is an example of:

Correct : B. communication systems

38. Cybertrails are advantageous because:

Correct : D. offenders who are unaware of them leave behind more clues than they otherwise would have.

39. Personal computers and networks are often a valuable source of evidence. Those involved with _______ should be comfortable with this technology.

Correct : D. all of the above

40. Computers can play the following roles in a crime:

Correct : B. evidence, instrumentality, contraband, or fruit of crime

41. The following specializations exist in digital investigations:

Correct : D. all of the above

42. The process of documenting the seizure of digital evidence and, in particular, when that evidence changes hands, is known as:

Correct : A. chain of custody

43. When assessing the reliability of digital evidence, the investigator is concerned with whether the computer that generated the evidence was functioning normally, and:

Correct : B. whether there are indications that the actual digital evidence was tampered with

44. The fact that with modern technology, a photocopy of a document has become acceptable in place of the original is known as:

Correct : A. best evidence rule

45. An investigation can be hindered by the following:

Correct : D. all of the above

46. Forensic analysis involves the following:

Correct : A. assessment, experimentation, fusion, correlation, and validation

47. The first step in applying the scientific method to a digital investigation is to:

Correct : C. make one or more observations based on events that occurred

48. The process model whose goal is to completely describe the flow of information in a digital investigation is known as:

Correct : C. the evidence flow model

49. The crime scene preservation process includes all but which of the following:

Correct : C. confirming system date and time

50. Investigative reconstruction is composed of three different forms. Which of the following is NOT one of those three forms?

Correct : B. intentional

51. In crimes against individuals the ______ period leading up to the crime often contains the most important clues regarding the relationship between the offender and the victim.

Correct : A. 24-hour

52. The type of report that is a preliminary summary of findings is known as:

Correct : B. threshold assessment report

53. Creating a histogram of times to reveal periods of high activity is an example of which form of investigative reconstruction?

Correct : D. temporal

54. Investigators should not rely on one piece of digital evidence when examining an alibi – they should look for an associated _______.

Correct : A. cybertrail

55. It is quite difficult to fabricate an alibi on a network successfully because:

Correct : C. an individual rarely has the ability to falsify digital evidence on all the computers that are involved.

56. Types of digital evidence that might corroborate an alibi include:

Correct : D. all of the above

57. To demonstrate that someone is lying about an alibi, it is necessary to:

Correct : A. find evidence that clearly demonstrates the lie

58. In confirming an alibi involving an obscure piece of equipment, if no documentation is available, the manufacturer is no longer in business, or the equipment/network is so complicated that nobody fully understands how it works, you should:

Correct : C. recreate the events surrounding the alibi

59. Absence of evidence refutes an alibi.

Correct : B. false

60. An implication from studies indicating that many stalkers had prior acquaintance with their victims is that:

Correct : C. investigators should pay particular attention to acquaintances of the victim

61. When a cyberstalking case is stalled, it is a good idea to interview the victim again, because:

Correct : B. the information that investigators have gathered might help the victim recall additional details.

62. That part of cyberstalking where the offender is using the Internet to find a victim is known as:

Correct : C. surreptitious monitoring

63. The _____________ documentation specifies who handled the evidence, when, where, and for what purpose.

Correct : B. . chain of custody

64. When you have developed a theory, what can you do to confirm that your hypothesis is correct?

Correct : D. all of the above

65. Of particular significance in the scientific method is the weight attached to finding evidence which supports a particular hypothesis

Correct : A. true

66. When reconstructing evidence surrounding a violent crime, it is generally helpful to:

Correct : C. construct a timeline of events from digital evidence

67. Computers and mobile devices are treated as _________ crime scenes in violent crime investigations.

Correct : D. secondary

68. Given the scope and consequences of violent crimes, it is advisable to seek out and preserve all available digital evidence.

Correct : A. true

69. In the course of conducting forensic analysis, which of the following actions are carried out?

Correct : D. all of the above

70. Security Measures Needed to protect ________ during their transmission

Correct : B. data

71. __________ means knowledge obtained from investigation, study , intelligence new ,facts .

Correct : C. information

72. Prevention of the unauthorised used of Resources refers too?

Correct : C. acess control

73. Protection against Denial by one of these parties in a communication refers to?

Correct : A. non-repudiation

74. Which One of them is Passive attack?

Correct : D. obtain message contain

75. What is lying of IP address called as?

Correct : A. ip spoofing

76. What is full form of DDoS?

Correct : B. distributed denial of service

77. A hacker guessing suggested password to a program is call as?

Correct : C. default password attack

78. Symmetric key encryption is also called as?

Correct : B. private key encryption

79. Conversion of Cypher text to plain text?

Correct : B. decryption

80. __is used to create the organisation's overall security program.

Correct : A. program policy

81. An act of protecting information from unauthorised disclouser to an entity.-

Correct : C. confidentiality

82. A way to ensure that the entity is indeed what it claims to be.-

Correct : A. authentication

83. The__model is 7 layer architecture where each layer is having some specific functionality to perform.

Correct : B. osi

84. The full form of OSI is OSI model__.

Correct : A. open systems interconnection

85. The technique in which when one character is replaced by another Character is called as?

Correct : B. substitution

86. Conversion of plain text into Cipher text is called as________.

Correct : A. encryption

87. In Symmetric schemes requires both parties to share how many secret key?

Correct : A. one

88. Blum Blum Shub Generator is based on which Algorithm?

Correct : B. public key

89. In DES step both LPT and RPT undergoes in how much key Rounds?

Correct : B. 16

90. What is the 4th step in DES Algorithm?

Correct : C. p-box permutation

91. In AES in which Round Subkeys are Generated from Original key for each round?

Correct : A. key expansion

92. AES stands for ?

Correct : B. advance encryption standard

93. Which of them is type of Cipher?

Correct : C. both of them

94. The message which is not understandable is called as?

Correct : A. cipher text

95. _______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction.

Correct : C. information security

96. _______ platforms are used for safety and protection of information in the cloud.

Correct : A. cloud workload protection platforms

97. Compromising confidential information comes under _________

Correct : B. threat

98. An attempt to harm, damage or cause threat to a system or network is broadly termed as ______

Correct : B. cyber attack

99. The CIA triad is often represented by which of the following?

Correct : A. triangle

100. Related to information security, confidentiality is the opposite of which of the following?

Correct : B. disclosure