You are on page 1of 5

T.Y.B.Sc.

IT SEM VI SIC MCQ-Unit-3


Q 1. A web interface can be accessed from any ________ location through internet.
A. Remote
B. low
C. high
D. source
Ans. A
Q 2. Forms are used to
A. Secure connection
B. Send information
C. provide protocols
D. hijack sessions
Ans. B
Q 3. JavaScript is _________ side scripting
A. Server
B. Client side
C. SQL query
D. Application
Ans. B
Q 4. VBScript is _________ site scripting
A. Server
B. Client side
C. SQL query
D. Application
Ans. B
Q 5. The _______ command doesn’t reveal the data in the URL
A. Hide
B. Post
C. Gets
D. Pre Hide
Ans. B
Q 6. GUID is an Acronym for
A. general unique identifier
B. globally unique integer
C. get unique identifier
D. globally unique identifier
Ans. D
Q 7. When the same key is used to encrypt and decrypt the data, the technique is called
A. symmetric cryptography
B. Asymmetric cryptography
C. asymptotic cryptography
D. Steganography
Ans. A

For Queries / Assistance / Sharing document on Campus Orbit - email us at


campus.connect59@gmail.com or www.campusorbit.com
T.Y.B.Sc. IT SEM VI SIC MCQ-Unit-3
Q 8. NAT is an acronym for
A. National Address Translation
B. Network Address of Traffic
C. Network address translation
D. No address translation
Ans. C
Q 9. The ____________security program must include the right level of responsibility and
authorization to be effective.
A. Authority
B. Framework
C. Planning
D. Gap Analysis
Ans. A
Q 10. ________________for the use of software, computer systems, and networks should be clearly
documented for the sake of the people who use these technologies
A. Rules
B. Guidelines
C. Program
D. Network
Ans. B
Q 11. A _________________ is a plan of action for how to implement the security remediation plans.
A. Planning
B. Road
C. Roadmap
D. Gap Analysis
Ans. C
Q 12. ______________is concerned with protecting information in all its forms, whether written,
spoken, electronic, graphical, or using other methods of communication.
A. Information security
B. Network Security
C. Computer Security
D. Graphics Security
Ans. A
Q 13. ___________is an important asset.
A. Information
B. Algorithm
C. Program
D. CCTV
Ans. A
Q 14. FUD stands for ___________
A. fear, understanding, defence
B. fear, uncertainty, and doubt
C. fact, uncertainty, defence
D. fact, understanding, defence
Ans. B
For Queries / Assistance / Sharing document on Campus Orbit - email us at
campus.connect59@gmail.com or www.campusorbit.com
T.Y.B.Sc. IT SEM VI SIC MCQ-Unit-3
Q 15. Which is not a part of Building a Security Program
A. Authority
B. Framework
C. Planning
D. Defence
Ans. D
Q 16. You can never be _____________ percentage secure about security.
A. 10
B. 25
C. 50
D. 100
Ans. D
Q 17. A ______________ compares the desired state of the security program with the actual current
state and identifies the differences.
A. risk analysis
B. Remediation planning
C. gap analysis
D. Planning
Ans. C
Q 18. one of the following is not three Ds of security
A. defence
B. deterrent
C. detect
D. delete
Ans. D
Q 19. A universal truth of security, regardless of the application, is that the job of the attacker is always
___________ than the job of the defender.
A. Difficult
B. Very Difficult
C. Easy
D. Extremely Difficulty
Ans. C
Q 20. ______________is concerned with protecting information in all its forms, whether written,
spoken, electronic, graphical, or using other methods of communication.
A. Information security
B. Network Security
C. Computer Security
D. Graphics Security
Ans. A
Q 21. The basic assumptions of security are as follows
A. We want to protect our assets.
B. There are threats to our assets.
C. We want to mitigate those threats.
D. All of the above
Ans. D

For Queries / Assistance / Sharing document on Campus Orbit - email us at


campus.connect59@gmail.com or www.campusorbit.com
T.Y.B.Sc. IT SEM VI SIC MCQ-Unit-3
Q 22. ___________ ensures that the data is not changed
A. Confidentiality
B. Integrity
C. Authenticity
D. Availability
Ans. B
Q 23. ___________ ensures that the data is received only by the intended receiver
A. Confidentiality
B. Integrity
C. Authenticity
D. Availability
Ans. A
Q 24. ____________ ensures that the resources are safe
A. Confidentiality
B. Integrity
C. Authenticity
D. Availability
Ans. D
Q 25. _______________ produces priorities and timelines for security initiatives.
A. assessment
B. planning
C. action
D. planning
Ans. B
Q 26. The __________ of the security team produce the desired results based on the plans.
A. assessment
B. planning
C. action
D. planning
Ans. C
Q 27. A security ________ provides a defensible approach to building the program.
A. assessment
B. planning
C. action
D. framework
Ans. D
Q 28. _______________ is a source for the threat theft and the target is intellectual property
A. employee
B. contractor
C. consultant
D. vendor
Ans. A

For Queries / Assistance / Sharing document on Campus Orbit - email us at


campus.connect59@gmail.com or www.campusorbit.com
T.Y.B.Sc. IT SEM VI SIC MCQ-Unit-3
Q 29. _______________ is a source for the threat loss and the target is trade secret intellectual
property
A. employee
B. contractor
C. consultant
D. vendor
Ans. B
Q 30. _______________ is a source for the Exposure loss and the target is Personally identifiable
information
A. employee
B. contractor
C. consultant
D. vendor
Ans. C

For Queries / Assistance / Sharing document on Campus Orbit - email us at


campus.connect59@gmail.com or www.campusorbit.com

You might also like