Web Security and forensics Multiple choice questions

Web Security and forensics Multiple choice questions

  1. If a DNS server accepts and uses the wrong details from a host that has no authority giving that information, then this technique is called …?
    a) DNS hijacking
    b) DNS lookup
    c) DNS spoofing
    d)All of the above
    e)a and b     f)None of the above 
    Answer - Click Here:
    c
  2. block cypher used by PGP to encrypts data…
    a) international data encryption algorithm
    b) internet data encryption algorithm
    c) private data encryption algorithm
    d) All of the above
    Answer - Click Here:
    a
  3. Pretty good privacy PGP(Pretty Good Privacy) is used in…
    a) browser security
    b) email security
    c) FTP security
    d) none of the mentioned
    Answer - Click Here:
    b
  4. The extensible authentication protocol is an authentication framework used in…
    a) wired local area network
    b) wireless networks
    c) wired personal area network
    d) all of the above
    Answer - Click Here:
    b
  5. What is used to carry traffic of one protocol over
    the network that does not support that protocol directly…
    a) Tunnelling
    b) Trafficking
    c) Transferring 
    d) Switching
    Answer - Click Here:
    a
  6.  In which Mode the authentication header is inserted
    immediately after the IP header…
    a) Tunnel
    b) Transport
    c) Authentication
    d) Both A and B
    Answer - Click Here:
    a
  7. Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection…
    a) VNP
    b) VSPN
    c) VSN
    d) VPN
    Answer - Click Here:
    d
  8. What term is considered as a basis for most robust authentication schemes…
    a)Registration
    b)Identification
    c)Encryption
    d)Refine information
    Answer - Click Here:
    c
  9. A method that uses two independent pieces/processes of information to identify a user is known as…
    a)Authentication through encryption
    b)Password-method authentication
    c)Two-method authentication
    d)Two-factor authentication
    Answer - Click Here:
    d
  10.  Where the security enforcement is needed firstly…
    a)Scripting
    b)Application
    c)Assigning Roles
    Administration
    Answer - Click Here:
    b
  11. Which database allows a system administrator to associate a function with a relation…
    a)Virtual database
    b)Private database
    c)Custom database
    d)Virtual Private Database(VPD)
    Answer - Click Here:
    d
  12.  Applications create queries dynamically, can be considered as a risk source of …
    a)Active attacks
    b)Passive attacks
    c)Forgery
    d)Injection
    Answer - Click Here:
    d