Class:T.Y.B.Sc.I.
T
Subject:Security in computing
Paper Name: Security in computing
Paper Code: USIT602
1 The three D’s of security
A Defense, Detection ,Divide
B Defend ,Detect ,Dig
C Defense ,Deterrence ,Detection
D Divide ,Disguise ,Detect
2 You are never ____________ percent secure.
A 60
B 90
C 100
D 80
3 What is the function of a firewall?
A protects the computer in case of fire
B Block or screen out spam
C Prevents the CPU from being overheated
D Helps to prevent outsiders from obtaining unauthorized access
4 __________ is the act of capturing packets of data flowing across a
computer network
A packet catching
B packet snipping
C packet sniffing
D packet pulling
5 ___________ is a network authentication system based on the use of
tickets.
A Kerberos
B Railway
C SSL
D TLS
6 A ________________issues, catalogs, renews, and revokes certificates
under the Management of a policy and administrative control.
A Certification authority
B Registration authorithy
C Revocation Authority
D Digital authority
7 If the virus executes, does its damage, and terminates until the next time
it is executed, it is known as a __________________
A nonresident virus
B stealth virus
C overwriting virus
D prepending virus
8 Failure recovery and media recovery fall under ........
A transaction recovery
B database recover
C system recovery
D value recovery
9 Keyloggers are a form of ______________.
A Spyware
B Shoulder surfing
C Trojan
D Social engineering
10 Router operates in which layer of OSI Reference Model?
A Layer 1 (Physical Layer)
B Layer 3 (Network Layer)
C Layer 4 (Transport Layer)
D Layer 7 (Application Layer)
11 DNS is the abbreviation of
A Dynamic Name System
B Dynamic Network System
C Domain Name System
D Domain Network Service
12 IPv4 uses ________ bit addresses while IPv6 uses _________ bit
addresses.
A 32, 64
B 32, 128
C 64, 128
D 128, 256
13 Security bugs are also known as _______
A security defect
B security problems
C system defect
D software error
14 Which of the following is not session layer vulnerability?
A Mishandling of undefined, poorly define
B Spoofing and hijacking of data based on failed authentication attempts
C Passing of session-credentials allowing intercept and unauthorized use
D Weak or non-existent authentication mechanisms
15 What are the different ways to intrude?
A Buffer overflows
B Unexpected combinations
C False conditions
D Anything which is unexpectedly happen