Cyber Security IV Question Bank
Cyber Security IV Question Bank
Cyber Security IV Question Bank
2)When an attempt is to make a machine or network resource unavailable to its intended users,
the attack is called
a) denial-of-service attack
b) slow read attack
c) spoofed attack
d) starvation attack
6) Which one of the following is a process that uses the spawn mechanism to revage the system
performance?
a) worm
b) trojen
c) threat
d) virus
8)If the set of resources available to the process is fixed throughout the process’s lifetime then
its domain is
a) static
b) dynamic
c) neither static nor dynamic
d) none of the mentioned.
12)Which principle states that programs, users and even the systems be given just enough
privileges to perform their task?
a) principle of operating system
b) principle of least privilege
c) principle of process scheduling
d) none of the mentioned
13)In asymmetric encryption
a) same key is used for encryption and decryption
b) different keys are used encryption and decryption
c) no key is required for encryption and decryption
d) none of the mentioned
17). For a domain _______ is a list of objects together with the operation allowed on these
objects.
a) capability list
b) access list
c) both (a) and (b)
d) none of the mentioned
18). Which one of the following is not an attack, but a search for vulnerabilities to attack?
a) denial of service
b) port scanning
c) memory access violation
d) dumpster diving
20). Select the correct order for the different phases of virus execution.
i) Propagation phase ii) Dormant phase
iii) Execution phase iv) Triggering phase
A) i, ii, iii, and iv
B) i, iii, ii and iv
C) ii, i, iv an iii
D) ii, iii, iv and i
21). …………….. are used in denial of service attacks, typically against targeted web sites.
A) Worm
B) Zombie
C) Virus
D) Trojan horse
22). A portion of the Polymorphic virus, generally called a …………………….. , creates, a random
encryption, key to encrypt the remainder of the virus.
A) mutual engine
B) mutation engine
C) multiple engine
D) polymorphic engine
23). …………………….. is a form of virus explicitly designed to hide itself from detection by
antivirus software.
A) Stealth virus
B) Polymorphic Virus
C) Parasitic Virus
D) Macro Virus
24). A ……………… is a program that secretly takes over another Internet-attached computer and
then uses that computer to launch attacks.
A) Worm
B) Zombie
C) Virus
D) Trap doors
25._______ is the practice and precautions taken to protect valuable information from
unauthorised access, recording, disclosure or destruction.
a) Network Security
b) Database Security
c) Information Security
d) Physical Security
26._____ platforms are used for safety and protection of information in the cloud.
a) Cloud workload protection platforms
b) Cloud security protocols
c) AWS
d) One Drive
b)It is a software application designed to probe a server or host for open ports
c)It is software used to scan system for introducing attacks by brute force