0% found this document useful (0 votes)
437 views10 pages

Sample SiC MCQ

This document contains 10 multiple choice questions each from 6 units on the topic of security in computing. The questions cover a range of topics including important assets, security models, the three D's of security, threat vectors, authentication methods, network layers, firewalls, intrusion detection systems, virtual machines and cloud computing services.

Uploaded by

Kim Jhon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
437 views10 pages

Sample SiC MCQ

This document contains 10 multiple choice questions each from 6 units on the topic of security in computing. The questions cover a range of topics including important assets, security models, the three D's of security, threat vectors, authentication methods, network layers, firewalls, intrusion detection systems, virtual machines and cloud computing services.

Uploaded by

Kim Jhon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

TYBSc IT Sem VI Sub: Security in Computing Sample MCQ

Unit -I

1. Which of the following is an important asset for any company or organization?


◯ Employees
◯ Information
◯ Salary
◯ Customers

2. What model was an open model?


◯ Government model
◯ Academic model
◯ Both Gov. and academic
◯ Modern security model

3. What refers to the ability of the organization that allows it to respond rapidly to the
changes in the external and internal environment?
◯ Business Agility
◯ Portability
◯ Cost Reduction
◯ Security Methodology

4. Three D's of the security are as follows:


◯ Defence , Dynamic, Does
◯ Detect, Display, Dynamic
◯ Defence , Detection, Deterrence
◯ Defence , Definition , Do

5. Following which is nothing but resisting attack


◯ Defence
◯ Detection
◯ Deterrence
◯ All the above
TYBSc IT Sem VI Sub: Security in Computing Sample MCQ

6. What process of identifying presence of some malicious activity which is concealed?


◯ Detection
◯ Deterrence
◯ Defence
◯ All the above

7. Which is an effective method of reducing frequency of security compromises ,and


thereby total loss due to security incidents?
◯ Detection
◯ Deterrence
◯ Defence
◯ Dynamic

8. What is a path or tool used by the hacker to attack the system?


◯ Threat
◯ Threat Vector
◯ User
◯ Instrument

9. Attack attempts to modify the system resources or affect their operations is


called_______
◯ Active Attack
◯ passive attack
◯ User
◯ All the above

10. Which attack attempts to learn or make use of information from the system but does not
affect resources.
◯ Active Attack
◯ passive attack
◯ User
◯ Both a and b

Unit 2
TYBSc IT Sem VI Sub: Security in Computing Sample MCQ

1. ________ is the process of determining who is the user


◯ Authentication
◯ Availability
◯ Identification
◯ Validation

2. Username and password is __________ type of authentication


◯ MFA
◯ SFA
◯ Two factor authentication
◯ PPF
3. ________factor authentication involves two level authentication
◯ MFA
◯ SFA
◯ Two factor authentication
◯ SBF
4. Use of OTP is __________type of authentication
◯ MFA
◯ SFA
◯ Two factor authentication
◯ SBF

5. Local storage and comparison is a method of _________


◯ Authentication
◯ Authorization
◯ Validation
◯ All the above
6. Username and password is a method of _________
◯ Authentication
◯ Authorization
◯ Verification
◯ All the above

7. Central storage and comparison is a method of _________


◯Authentication
◯Authorization
◯Both the above
◯Validation and Verification
TYBSc IT Sem VI Sub: Security in Computing Sample MCQ

8. Kerberos is a method of _________


◯ Authentication
◯ Authorization

◯Verification
◯ All the above

9. One time password system is a method of _________


◯Authentication
◯Authorization
◯Both the above
◯Validation

10. Biometrics is a method of _________


◯Authentication
◯Authorization
◯Both the above
◯Integration of Fingered print

Unit 3

1. An acceptable level of information systems risk depends on the individual organization


and its ability to tolerate risk
◯ True
◯ False

2. In Cisco H. Model _________layer forms the network backbone and it is focused on


moving data as fast as possible between distribution layers
◯ Access layer
◯ Core layer
◯ Distribution layer
◯ Application layer
TYBSc IT Sem VI Sub: Security in Computing Sample MCQ

3. In Cisco H. Model _________layer aggregates traffic from all nodes and uplinks from
the access layer and provide policy based connectivity.
◯ Access layer
◯ Core layer
◯ Distribution layer
◯ Transport layer

4. High availability ,security, quality of service and IP multicasting are the features of
________layer
◯ Access layer
◯ Core layer

◯ Network layer
◯ Distribution layer

5. _______ is a private network of an organization which is accessible only to the members


of the organization
◯ Internet
◯ Intranet
◯ Extranet
◯ ARPANET

6. _______ is also private network controlled by organization and can be used for
providing application access to trusted external parties such as supplier, vendors,partners
and customers
◯ Internet
◯ Intranet
◯ Extranet
◯ Mesh
Topology

7. It is possible to prevent direct connection between external and internal users via ______
◯ Firewall
◯ Proxy
services
TYBSc IT Sem VI Sub: Security in Computing Sample MCQ

◯ ACL

◯ Router

8. MAC addresses are ____ bit hexadecimal colon separated numbers assigned to NIC by
the manufacturer
◯ 48
◯ 32
◯ 16
◯ 22
9. IPV6 addresses are ______bit in a size
◯ 48
◯ 128
◯ 16
◯ 22

10. To send traffic ,sending device must have destination device _______ address
◯ IP address
◯ MAC
◯ Both the above
◯ TCP

Unit 4

1. Which of the following is the most commonly used VoIP standard?


a) SDP
b) IMS
c) SIP
d) MGCP

2. Which of the following is more light weight protocol among listed below?
a) H.323
b) MGCP
c) SIP
d) IMS

3. VOIP stands for:


a)Voice Over Internet Protocol
b)Voice Over Internal Protocol
c)Voice Over International Premises
d)Over Internal Premises
TYBSc IT Sem VI Sub: Security in Computing Sample MCQ

4. VOIP networks use primarily what kind of switching technology


a)Protocol switching
b)Packet switching
c)Constantly switching
d)Cellular switching

5. _________is an independent platform that identifies intrusion by examining network


traffic and monitors multiple host
◯ SIDS
◯ NIDS
◯ HIDS
◯ NEDS

6. _________consist of an agent on a host that identifies and intrusion by analysing system


calls, application logs,etc
◯ SIDS
◯ NIDS
◯ HIDS
◯ VOIP

7. ________ identifies packets when it going through TCP/IP stack


◯ SIDS
◯ NIDS
◯ HIDS
◯ PXB
8. IPS stands for _______
◯ intrusion protection system
◯ intrusion prevention sytem
◯ Intrusion private system
◯ Internet public service
9. ___________method of detection uses signatures ,which are attack patterns that are
preconfigured and predetermined
◯ Statistical anomly based detection
◯ Stateful protocol analysis decison
◯ signature based detection

Secure information and event management
TYBSc IT Sem VI Sub: Security in Computing Sample MCQ

10. _______ method identifies deviations of protocol states by comparing observed events
with predetermined profile of generally accepted definition of begin activity
◯ Stateful protocol analysis decision
◯ signature based detection
◯ Click Statistical anomly based detection add a new answer choice
◯ Choice based system

Unit 5

1. Creating computer within a computer is known as _________


◯ Virtual Machine
◯ Nested Computer
◯ Computer in Computer
◯ Computing

2. ________ is a computer file typically called an image,which behave like an actual


computer
◯ Virtual Machine
◯ computer image
◯ Computer in Computer
◯ Computer Program

3. Depending on use and level of dependencies virtual machines can be divided into
________ categories
◯ 1
◯ 2
◯ 3
◯ 5

4. _______ virtual machine support the host computers physical resources between (1 point)
multiple virtual machines, each running with its own copy of the operating
system
◯Process virtual machine
◯system virtual machine
◯OS
◯Mobile Computing
TYBSc IT Sem VI Sub: Security in Computing Sample MCQ

5. _________is designed to provide platform independent programming environment that


makes the information of the underlying hardware or OS and allows program execution
to take place in the same way on the given platform
◯Process virtual machine
◯system virtual machine
◯Virtual Private Network
◯Private Network

6. ________provides us means by which we can access the applications as utilities over


the Internet
◯ virtual machine
◯ system virtual
machine
◯ Cloud computing
◯ JVM

7. _______of the following service provides companies with computing


resources including server, networking, storage and data centre space etc.
◯ IaaS
◯ SaaS
◯ PaaS
◯ VaaS

8. _______of the following service provides a cloud based environment with everything
required to support the complete life cycle of building and delivering cloud based
application without the cost and complexity of buying and managing the underlying
hardware and software, provisions etc
◯ IaaS
◯ SaaS
◯ PaaS

VaaS

9. SDL stands for_______


◯ Software development life cycle
◯Secure development life cycle
TYBSc IT Sem VI Sub: Security in Computing Sample MCQ

◯ standard life cycle


◯ Standard Data Linker

10. ______ phase if SDL consist of activities that occur prior to writing code
◯Requirement
◯Design
◯Coding
◯ Encoding

You might also like