You are on page 1of 8

12/17/22, 10:19 AM Introduction to Cyber Security III (2022 -23 PG - SY M.

COM)

Introduction to Cyber Security III


AY 2022-23

Points: 21/25

Incorrect 0/1 Points

1. What are the different ways to intrude? (Choose 3) *

a) Buffer overflows 

b) Unexpected combinations and unhandled input 


c) Race conditions 

d) Backdoor

Incorrect 0/1 Points

2. What are major components of intrusion detection system ? (Choose 3) *

a) Analysic Engine 
b) Event provider 
c) Zone system

d) Alert Database 

https://forms.office.com/pages/responsepage.aspx?id=-bbi5YTAmECFB51fbNIY7HAztW_FesNIjEIbMU0agSBUOFVNNkdHNFgxUjdQUVJYWTF… 1/8
12/17/22, 10:19 AM Introduction to Cyber Security III (2022 -23 PG - SY M.COM)

Incorrect 0/1 Points

3.  What are the different ways to classify an IDS ? (Choose 3) *

a) anomaly detection 
b) signature based misuse 

c) stack based 
d) zone based

Correct 1/1 Points

4. What are the different ways to classify an IDS ? (Choose 2) *

a) Zone based

b) Host based 
c) Network based 
d) Level based

Correct 1/1 Points

5. What are characteristics of anomaly based IDS? *

a) It models the normal usage of network as a noise characterization 


b) It doesn't detect novel attacks

c) Anything distinct from the noise is assumed to be intrusion activity 

d) It detects based on signature

https://forms.office.com/pages/responsepage.aspx?id=-bbi5YTAmECFB51fbNIY7HAztW_FesNIjEIbMU0agSBUOFVNNkdHNFgxUjdQUVJYWTF… 2/8
12/17/22, 10:19 AM Introduction to Cyber Security III (2022 -23 PG - SY M.COM)

Correct 1/1 Points

6. What is major drawback of anomaly detection IDS ? *

a) These are very slow at detection

b) It generates many false alarms 


c) It doesnt detect novel attacks

d) None of these

Correct 1/1 Points

7. What are characteristics of signature based IDS ? (Choose two) *

a) Most are based on simple pattern matching algorithms. 


b) It is programmed to interpret a certain series of packets 

c) It models the normal usage of network as a noise characterization

d) Anything distinct from the noise is assumed to be intrusion activity

Correct 1/1 Points

8. What are drawbacks of signature based IDS ? (Choose two) *

a) They are able to detect novel attacks

b) They suffer from false alarms 


c) They have to be programmed again for every new pattern to be detected 

d) They are unable to detect novel attacks 

https://forms.office.com/pages/responsepage.aspx?id=-bbi5YTAmECFB51fbNIY7HAztW_FesNIjEIbMU0agSBUOFVNNkdHNFgxUjdQUVJYWTF… 3/8
12/17/22, 10:19 AM Introduction to Cyber Security III (2022 -23 PG - SY M.COM)

Correct 1/1 Points

9. What are characteristics of Host based IDS ? (Choose 3) *

a) The host operating system logs in the audit information 


b) Logs includes logins,file opens and program executions 
c) Logs are analysed to detect tails of intrusion 
d) Logs are archived daily

Correct 1/1 Points

10. What are characteristics of stack based IDS ? *

a) They are integrated closely with the TCP/IP stack and watch packets 
b) The host operating system logs in the audit information

c) It is programmed to interpret a certain series of packets

d) It models the normal usage of network as a noise characterization

Correct 1/1 Points

11. A firewall is a ---------------- *

choke point 

control unit

Auditing point

access point

https://forms.office.com/pages/responsepage.aspx?id=-bbi5YTAmECFB51fbNIY7HAztW_FesNIjEIbMU0agSBUOFVNNkdHNFgxUjdQUVJYWTF… 4/8
12/17/22, 10:19 AM Introduction to Cyber Security III (2022 -23 PG - SY M.COM)

Correct 1/1 Points

12. DMZ means – *

Data manipulation zone

Demilitarized zone 
Data manufacturing zone

Data mining zone

Correct 1/1 Points

13. Only authorized traffic ,as defined by the local--------- policy ,is allowed to pass
through a firewall. *

network

FTP

security 
connection

Correct 1/1 Points

14. Before you start to design your firewall ,it is important to study – *

Environment

Recovery area

pc network

existing network architecture 

https://forms.office.com/pages/responsepage.aspx?id=-bbi5YTAmECFB51fbNIY7HAztW_FesNIjEIbMU0agSBUOFVNNkdHNFgxUjdQUVJYWTF… 5/8
12/17/22, 10:19 AM Introduction to Cyber Security III (2022 -23 PG - SY M.COM)

Correct 1/1 Points

15. There are----- basic design policies of firewalls


*

Two 
Three

Four

Five

Correct 1/1 Points

16.
PFF means --------------- *

Packet filling firewalls

packet filtering firewalls 

packet force firewalls

none of above

Correct 1/1 Points

17.  A stateful packet filtering firewall looks at each packet and applies rules or ----
-------------
*

checks

contexts

test 

tracks

https://forms.office.com/pages/responsepage.aspx?id=-bbi5YTAmECFB51fbNIY7HAztW_FesNIjEIbMU0agSBUOFVNNkdHNFgxUjdQUVJYWTF… 6/8
12/17/22, 10:19 AM Introduction to Cyber Security III (2022 -23 PG - SY M.COM)

Correct 1/1 Points

18. A circuit level firewall doesn’t simply allow or disallow packets but also
determines wheather the connection between both ends is valid--- *

True 
False

Incorrect 0/1 Points

19. Use an application specific gateway proxy to  the traffic *

control 
avoid

Pass

analyse

Correct 1/1 Points

20. PF means ---- *

Proxy firewalls 

packet firewalls

policy firewalls

pass firewalls

https://forms.office.com/pages/responsepage.aspx?id=-bbi5YTAmECFB51fbNIY7HAztW_FesNIjEIbMU0agSBUOFVNNkdHNFgxUjdQUVJYWTF… 7/8
12/17/22, 10:19 AM Introduction to Cyber Security III (2022 -23 PG - SY M.COM)

Correct 1/1 Points

21. Circuit level firewalls are working between the two layers --- *

Physical-data link layer

session –Transport layer 


network –Transport layer

Application-Presentation layer.

Correct 1/1 Points

22. Firewalls can be implemented in hardware or ----------------- *

Program

Printer

network 

software 

Correct 1/1 Points

23. In a DMZ configuration most computer on the ------------run behind


computers also run outside the Firewall. *

WAN

LAN 

MAN

None

Correct 1/1 Points

24.              Computing is the collection of computer resources from multiple

https://forms.office.com/pages/responsepage.aspx?id=-bbi5YTAmECFB51fbNIY7HAztW_FesNIjEIbMU0agSBUOFVNNkdHNFgxUjdQUVJYWTF… 8/8

You might also like