Web Security and forensics Multiple choice questions

Web Security and forensics Multiple choice questions

  1. If a DNS server accepts and uses the wrong details from a host that has no authority giving that information, then this technique is called …?
    a) DNS hijacking
    b) DNS lookup
    c) DNS spoofing
    d)All of the above
    e)a and b     f)None of the above 
    Answer - Click Here:
    c
  2. block cypher used by PGP to encrypts data…
    a) international data encryption algorithm
    b) internet data encryption algorithm
    c) private data encryption algorithm
    d) All of the above
    Answer - Click Here:
    a
  3. Pretty good privacy PGP(Pretty Good Privacy) is used in…
    a) browser security
    b) email security
    c) FTP security
    d) none of the mentioned
    Answer - Click Here:
    b
  4. The extensible authentication protocol is an authentication framework used in…
    a) wired local area network
    b) wireless networks
    c) wired personal area network
    d) all of the above
    Answer - Click Here:
    b
  5. What is used to carry traffic of one protocol over
    the network that does not support that protocol directly…
    a) Tunnelling
    b) Trafficking
    c) Transferring 
    d) Switching
    Answer - Click Here:
    a
  6.  In which Mode the authentication header is inserted
    immediately after the IP header…
    a) Tunnel
    b) Transport
    c) Authentication
    d) Both A and B
    Answer - Click Here:
    a
  7. Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection…
    a) VNP
    b) VSPN
    c) VSN
    d) VPN
    Answer - Click Here:
    d
  8. What term is considered as a basis for most robust authentication schemes…
    a)Registration
    b)Identification
    c)Encryption
    d)Refine information
    Answer - Click Here:
    c
  9. A method that uses two independent pieces/processes of information to identify a user is known as…
    a)Authentication through encryption
    b)Password-method authentication
    c)Two-method authentication
    d)Two-factor authentication
    Answer - Click Here:
    d
  10.  Where the security enforcement is needed firstly…
    a)Scripting
    b)Application
    c)Assigning Roles
    Administration
    Answer - Click Here:
    b
  11. Which database allows a system administrator to associate a function with a relation…
    a)Virtual database
    b)Private database
    c)Custom database
    d)Virtual Private Database(VPD)
    Answer - Click Here:
    d
  12.  Applications create queries dynamically, can be considered as a risk source of …
    a)Active attacks
    b)Passive attacks
    c)Forgery
    d)Injection
    Answer - Click Here:
    d

More MCQs of Networking Internet and Web

  1. Router MCQs
  2. Storage area network MCQs
  3. Networking Important MCQs
  4. Network Security MCQs

  5. Electrical Network Analysis MCQs 

  6. Networking Programming  MCQs

  7. Social Networks MCQs

  8. Network Layers OSI Model MCQs

  9. Digital Communication MCQs

  10. Telecommunication MCQs

  11. Transmission and switching MCQs

  12. Networking topologies Solved MCQs

  13. Computer Network MCQs for Lecturer Test

  14. Mobile and Wireless Network MCQs

  15. Cyber Crime Solved MCQs

  16. Internet Protocols MCQs

  17. Internet MCQs

  18. Web Security and forensics MCQs

  19. Web Security and forensics MCQs 2

  20. Wireless Security MCQs

  21. Datalink layer OSI Model MCQs

  22. Physical Layer OSI Model MCQs

  23. 7 layers OSI Model MCQs

  24. Application Layer MCQs

  25. WIFI MCQs

  26. Internet and Email MCQs

  27. Networking MCQs

  28. Public Service Commission network administrator MCQs

  29. LINUX MCQ’s

  30. Linux File Permissions MCQs

  31. Linux File Permissions MCQs 2

  32. Linux Startup and Shutdown MCQs

  33. Linux process Management MCQs 

    More MCQs of Networking on T4Tutorials

    Computer Science Repeated MCQs Book Download

Add a Comment