You are on page 1of 5

MCS

Cyber Security IV Question bank

1) The type(s) of auto executing macros, in Microsoft word is/are


a) Auto execute
b) Auto macro
c) Command macro
d) All of the above

2)When an attempt is to make a machine or network resource unavailable to its intended users,
the attack is called
a) denial-of-service attack
b) slow read attack
c) spoofed attack
d) starvation attack

3)_______ is an approach to restricting system access to authorized users.


a) Role-based access control
b) Process-based access control
c) Job-based access control
d) none of the mentioned

4)The code segment that misuses its environment is called a


a) internal thief
b) trojan horse
c) code stacker
d) none of the mentioned

5) For system protection, a process should access


a) all the resources
b) only those resources for which it has authorization
c) few resources but authorization is not required
d) all of the mentioned

6) Which one of the following is a process that uses the spawn mechanism to revage the system
performance?
a) worm
b) trojen
c) threat
d) virus

7) The pattern that can be used to identify a virus is known as


a) stealth
b) virus signature
c) armoured
d) multipartite

8)If the set of resources available to the process is fixed throughout the process’s lifetime then
its domain is
a) static
b) dynamic
c) neither static nor dynamic
d) none of the mentioned.

9)The protection domain of a process contains


a) object name
b) rights-set
c) both (a) and (b)
d) none of the mentioned

10) Multipartite viruses attack on


a) files
b) boot sector
c) memory
d) all of the mentioned

11). File virus attaches itself to the


a) source file
b) object file
c) executable file
d) all of the mentioned

12)Which principle states that programs, users and even the systems be given just enough
privileges to perform their task?
a) principle of operating system
b) principle of least privilege
c) principle of process scheduling
d) none of the mentioned
13)In asymmetric encryption
a) same key is used for encryption and decryption
b) different keys are used encryption and decryption
c) no key is required for encryption and decryption
d) none of the mentioned

14). Global table implementation of matrix table contains


a) domain
b) object
c) right-set
d) all of the mentioned

15). Access matrix model for user authentication contains


a) a list of objects
b) a list of domains
c) a function which returns an object’s type
d) all of the mentioned

16). Which one of the following is capability based protection system?


a) hydra
b) cambridge CAP system
c) both (a) and (b)
d) none of the mentioned

17). For a domain _______ is a list of objects together with the operation allowed on these
objects.
a) capability list
b) access list
c) both (a) and (b)
d) none of the mentioned

18). Which one of the following is not an attack, but a search for vulnerabilities to attack?
a) denial of service
b) port scanning
c) memory access violation
d) dumpster diving

19). What is a trap door in a program?


a) a security hole, inserted at programming time in the system for later use
b) a type of antivirus
c) security hole in a network
d) none of the mentioned

20). Select the correct order for the different phases of virus execution.
i) Propagation phase ii) Dormant phase
iii) Execution phase iv) Triggering phase
A) i, ii, iii, and iv
B) i, iii, ii and iv
C) ii, i, iv an iii
D) ii, iii, iv and i

21). …………….. are used in denial of service attacks, typically against targeted web sites.
A) Worm
B) Zombie
C) Virus
D) Trojan horse

22). A portion of the Polymorphic virus, generally called a …………………….. , creates, a random
encryption, key to encrypt the remainder of the virus.
A) mutual engine
B) mutation engine
C) multiple engine
D) polymorphic engine

23). …………………….. is a form of virus explicitly designed to hide itself from detection by
antivirus software.
A) Stealth virus
B) Polymorphic Virus
C) Parasitic Virus
D) Macro Virus

24). A ……………… is a program that secretly takes over another Internet-attached computer and
then uses that computer to launch attacks.
A) Worm
B) Zombie
C) Virus
D) Trap doors

25._______ is the practice and precautions taken to protect valuable information from
unauthorised access, recording, disclosure or destruction.
a) Network Security
b) Database Security
c) Information Security
d) Physical Security

26._____ platforms are used for safety and protection of information in the cloud.
a) Cloud workload protection platforms
b) Cloud security protocols
c) AWS
d) One Drive

27. Compromising confidential information comes under _________


a) Bug
b) Threat
c) Vulnerability
d) Attack

28.What is port scanning ?

a)It is a software used to scan system for attack

b)It is a software application designed to probe a server or host for open ports

c)It is software used to scan system for introducing attacks by brute force

d)None of the mentioned

You might also like