Professional Documents
Culture Documents
Set-I
1. What was the percentage increase in Zero Day Answer: (d)
d. All of the above
Vulnerabilities in the year 2015?
6. Which of the following is considered legal?
a. 4%
a. Hacking a social media account and
b. 50%
sending a private message
c. 100%
b. Hacking a bank account and siphoning
d. 125%
funds
Answer: (d)
c. Hacking a company’s security system
2. What hacking attacks were mentioned in the
with permission from the management
lesson?
d. All of the above
a. Hacking in French Election
Answer: (c)
b. ATM Hacking in India
c. Denial of Service attack in Turkish Bank
7. What is the cost of launching Denial of Service
d. All of the above
attack on a website?
Answer: (d)
3. Identify the software whose vulnerability is
a. $20/hr
a. Android c. $300/mont
Answer: (c)
5. Which of the following is/are correct with 9. Which of the following is correct for silent
a. Coverity
b. Prefix/Prefast
c. Both A and B
d. None of the
above Answer(c)
a. ASLR
b. ISR
c. Sys-call randomization
d. Memory randomization
Answer(d)
1. A may at any time be idle, or uid and the saved uid are assigned
to the user ID of the owner of the
have one or more executing on
file
its behalf. c. Both A and B
d. None of the above
a. subject, principals
Answer(d)
b. principal, subjects
c. subject, objects
6. Which of the following is a way to escape
d. principal, objects
Answer(b) jail as root?
109. Which of the following is a reason for 113. A Web site that allows users to enter
mounting CSRF attack? text, such as a comment or a name, and
a. Network Connectivity then stores it and later display it to other
b. Read Browser State users, is potentially vulnerable to a kind of
c. Write Browser State attack called a
d. All of the above attack.
Answer:- d
117. Which of the following is the best way
to prevent malicious input exploiting your
application?
a. Input validation using an allow List
b. Using encryption
a. browser security
b. email security
c. FTP security
d. wifi security Answer: b
45. When a DNS server accepts and uses incorrect information from a host that has no authority giving
that information, then it is called
a. DNS lookup
b. DNS hijacking
c. DNS spoofing
d. DNS authorizing Answer: c
46. Network layer firewall works as a
a. Frame filter
b. Packet filter
c. Content filter
d. Virus filter
Answer: b
47. Network layer firewall has two sub- categories as
a. State full firewall and stateless firewall
b. Bit oriented firewall and byte oriented firewall
c. Frame firewall and packet firewall
d. Network layer firewall and session layer firewall
Answer: a
48. A firewall is installed at the point where the secure internal network and untrusted external
network meet which is also known as
a. Chock point
b. Meeting point
c. Firewall point
d. Secure point Answer: a