You are on page 1of 3

Class:T.Y.B.Sc.I.

T
Subject:Security in computing
Paper Name: Security in computing
Paper Code: USIT602

1 The three D’s of security


A Defense, Detection ,Divide
B Defend ,Detect ,Dig
C Defense ,Deterrence ,Detection
D Divide ,Disguise ,Detect

2 You are never ____________ percent secure.


A 60
B 90
C 100
D 80

3 What is the function of a firewall?


A protects the computer in case of fire
B Block or screen out spam
C Prevents the CPU from being overheated
D Helps to prevent outsiders from obtaining unauthorized access

4 __________ is the act of capturing packets of data flowing across a


computer network
A packet catching
B packet snipping
C packet sniffing
D packet pulling

5 ___________ is a network authentication system based on the use of


tickets.
A Kerberos
B Railway
C SSL
D TLS

6 A ________________issues, catalogs, renews, and revokes certificates


under the Management of a policy and administrative control.
A Certification authority
B Registration authorithy
C Revocation Authority
D Digital authority

7 If the virus executes, does its damage, and terminates until the next time
it is executed, it is known as a __________________
A nonresident virus
B stealth virus
C overwriting virus
D prepending virus

8 Failure recovery and media recovery fall under ........


A transaction recovery
B database recover
C system recovery
D value recovery

9 Keyloggers are a form of ______________.


A Spyware
B Shoulder surfing
C Trojan
D Social engineering

10 Router operates in which layer of OSI Reference Model?


A Layer 1 (Physical Layer)
B Layer 3 (Network Layer)
C Layer 4 (Transport Layer)
D Layer 7 (Application Layer)

11 DNS is the abbreviation of


A Dynamic Name System
B Dynamic Network System
C Domain Name System
D Domain Network Service

12 IPv4 uses ________ bit addresses while IPv6 uses _________ bit
addresses.
A 32, 64
B 32, 128
C 64, 128
D 128, 256

13 Security bugs are also known as _______


A security defect
B security problems
C system defect
D software error

14 Which of the following is not session layer vulnerability?


A Mishandling of undefined, poorly define
B Spoofing and hijacking of data based on failed authentication attempts
C Passing of session-credentials allowing intercept and unauthorized use
D Weak or non-existent authentication mechanisms

15 What are the different ways to intrude?


A Buffer overflows
B Unexpected combinations
C False conditions
D Anything which is unexpectedly happen

You might also like