This document contains 30 multiple choice questions about information security topics like web interfaces, forms, scripting languages, encryption techniques, security programs, threats, and the goals of security. The questions are from a study guide on information security concepts for a university course. For each question there are 4 answer options but only one correct answer is provided.
Original Description:
Original Title
Mu Science Bscit Ty Bscit Sem 6 Usit602 2020-12-14 Mcq 3 Unit
This document contains 30 multiple choice questions about information security topics like web interfaces, forms, scripting languages, encryption techniques, security programs, threats, and the goals of security. The questions are from a study guide on information security concepts for a university course. For each question there are 4 answer options but only one correct answer is provided.
This document contains 30 multiple choice questions about information security topics like web interfaces, forms, scripting languages, encryption techniques, security programs, threats, and the goals of security. The questions are from a study guide on information security concepts for a university course. For each question there are 4 answer options but only one correct answer is provided.
Q 1. A web interface can be accessed from any ________ location through internet. A. Remote B. low C. high D. source Ans. A Q 2. Forms are used to A. Secure connection B. Send information C. provide protocols D. hijack sessions Ans. B Q 3. JavaScript is _________ side scripting A. Server B. Client side C. SQL query D. Application Ans. B Q 4. VBScript is _________ site scripting A. Server B. Client side C. SQL query D. Application Ans. B Q 5. The _______ command doesn’t reveal the data in the URL A. Hide B. Post C. Gets D. Pre Hide Ans. B Q 6. GUID is an Acronym for A. general unique identifier B. globally unique integer C. get unique identifier D. globally unique identifier Ans. D Q 7. When the same key is used to encrypt and decrypt the data, the technique is called A. symmetric cryptography B. Asymmetric cryptography C. asymptotic cryptography D. Steganography Ans. A
For Queries / Assistance / Sharing document on Campus Orbit - email us at
campus.connect59@gmail.com or www.campusorbit.com T.Y.B.Sc. IT SEM VI SIC MCQ-Unit-3 Q 8. NAT is an acronym for A. National Address Translation B. Network Address of Traffic C. Network address translation D. No address translation Ans. C Q 9. The ____________security program must include the right level of responsibility and authorization to be effective. A. Authority B. Framework C. Planning D. Gap Analysis Ans. A Q 10. ________________for the use of software, computer systems, and networks should be clearly documented for the sake of the people who use these technologies A. Rules B. Guidelines C. Program D. Network Ans. B Q 11. A _________________ is a plan of action for how to implement the security remediation plans. A. Planning B. Road C. Roadmap D. Gap Analysis Ans. C Q 12. ______________is concerned with protecting information in all its forms, whether written, spoken, electronic, graphical, or using other methods of communication. A. Information security B. Network Security C. Computer Security D. Graphics Security Ans. A Q 13. ___________is an important asset. A. Information B. Algorithm C. Program D. CCTV Ans. A Q 14. FUD stands for ___________ A. fear, understanding, defence B. fear, uncertainty, and doubt C. fact, uncertainty, defence D. fact, understanding, defence Ans. B For Queries / Assistance / Sharing document on Campus Orbit - email us at campus.connect59@gmail.com or www.campusorbit.com T.Y.B.Sc. IT SEM VI SIC MCQ-Unit-3 Q 15. Which is not a part of Building a Security Program A. Authority B. Framework C. Planning D. Defence Ans. D Q 16. You can never be _____________ percentage secure about security. A. 10 B. 25 C. 50 D. 100 Ans. D Q 17. A ______________ compares the desired state of the security program with the actual current state and identifies the differences. A. risk analysis B. Remediation planning C. gap analysis D. Planning Ans. C Q 18. one of the following is not three Ds of security A. defence B. deterrent C. detect D. delete Ans. D Q 19. A universal truth of security, regardless of the application, is that the job of the attacker is always ___________ than the job of the defender. A. Difficult B. Very Difficult C. Easy D. Extremely Difficulty Ans. C Q 20. ______________is concerned with protecting information in all its forms, whether written, spoken, electronic, graphical, or using other methods of communication. A. Information security B. Network Security C. Computer Security D. Graphics Security Ans. A Q 21. The basic assumptions of security are as follows A. We want to protect our assets. B. There are threats to our assets. C. We want to mitigate those threats. D. All of the above Ans. D
For Queries / Assistance / Sharing document on Campus Orbit - email us at
campus.connect59@gmail.com or www.campusorbit.com T.Y.B.Sc. IT SEM VI SIC MCQ-Unit-3 Q 22. ___________ ensures that the data is not changed A. Confidentiality B. Integrity C. Authenticity D. Availability Ans. B Q 23. ___________ ensures that the data is received only by the intended receiver A. Confidentiality B. Integrity C. Authenticity D. Availability Ans. A Q 24. ____________ ensures that the resources are safe A. Confidentiality B. Integrity C. Authenticity D. Availability Ans. D Q 25. _______________ produces priorities and timelines for security initiatives. A. assessment B. planning C. action D. planning Ans. B Q 26. The __________ of the security team produce the desired results based on the plans. A. assessment B. planning C. action D. planning Ans. C Q 27. A security ________ provides a defensible approach to building the program. A. assessment B. planning C. action D. framework Ans. D Q 28. _______________ is a source for the threat theft and the target is intellectual property A. employee B. contractor C. consultant D. vendor Ans. A
For Queries / Assistance / Sharing document on Campus Orbit - email us at
campus.connect59@gmail.com or www.campusorbit.com T.Y.B.Sc. IT SEM VI SIC MCQ-Unit-3 Q 29. _______________ is a source for the threat loss and the target is trade secret intellectual property A. employee B. contractor C. consultant D. vendor Ans. B Q 30. _______________ is a source for the Exposure loss and the target is Personally identifiable information A. employee B. contractor C. consultant D. vendor Ans. C
For Queries / Assistance / Sharing document on Campus Orbit - email us at
Shiva v. N. Parasram - Digital Forensics With Kali Linux - Enhance Your Investigation Skills by Performing Network and Memory Forensics With Kali Linux 2022.x,-Packt Publishing (2023)