Oops! It appears that you have disabled your Javascript. In order for you to see this page as it is meant to appear, we ask that you please re-enable your Javascript!

Web Security and forensics Multiple choice questions

Table of Contents

Web Security and forensics Multiple choice questions

  1. If a DNS server accepts and uses the wrong details from a host that has no authority giving that information, then this technique is called …?
    a) DNS hijacking
    b) DNS lookup
    c) DNS spoofing
    d)All of the above
    e)a and b     f)None of the above 
    Answer - Click Here:
    c
  2. block cypher used by PGP to encrypts data…
    a) international data encryption algorithm
    b) internet data encryption algorithm
    c) private data encryption algorithm
    d) All of the above
    Answer - Click Here:
    a
  3. Pretty good privacy PGP(Pretty Good Privacy) is used in…
    a) browser security
    b) email security
    c) FTP security
    d) none of the mentioned
    Answer - Click Here:
    b
  4. The extensible authentication protocol is an authentication framework used in…
    a) wired local area network
    b) wireless networks
    c) wired personal area network
    d) all of the above
    Answer - Click Here:
    b
  5. What is used to carry traffic of one protocol over
    the network that does not support that protocol directly…
    a) Tunnelling
    b) Trafficking
    c) Transferring 
    d) Switching
    Answer - Click Here:
    a
  6.  In which Mode the authentication header is inserted
    immediately after the IP header…
    a) Tunnel
    b) Transport
    c) Authentication
    d) Both A and B
    Answer - Click Here:
    a
  7. Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection…
    a) VNP
    b) VSPN
    c) VSN
    d) VPN
    Answer - Click Here:
    d
  8. What term is considered as a basis for most robust authentication schemes…
    a)Registration
    b)Identification
    c)Encryption
    d)Refine information
    Answer - Click Here:
    c
  9. A method that uses two independent pieces/processes of information to identify a user is known as…
    a)Authentication through encryption
    b)Password-method authentication
    c)Two-method authentication
    d)Two-factor authentication
    Answer - Click Here:
    d
  10.  Where the security enforcement is needed firstly…
    a)Scripting
    b)Application
    c)Assigning Roles
    Administration
    Answer - Click Here:
    b
  11. Which database allows a system administrator to associate a function with a relation…
    a)Virtual database
    b)Private database
    c)Custom database
    d)Virtual Private Database(VPD)
    Answer - Click Here:
    d
  12.  Applications create queries dynamically, can be considered as a risk source of …
    a)Active attacks
    b)Passive attacks
    c)Forgery
    d)Injection
    Answer - Click Here:
    d
Fazal Rehman Shamil Click Here to Know More
Instructor, Researcher, Blogger, SEO Expert, Poet and Publisher of International Journal Of Software, Technology & Science ISSN : 2616 - 5325
Dear Professors and Resarchers!You are welome to Cite these tutorials in your research or slides etc. Please don't forget to mention the reference of website. Copy Paste of text is strcitly forbidden. Images can be reuse because images are protected with watermark.