Web Security and forensics Multiple choice questions
Web Security and forensics Multiple choice questions
- If a DNS server accepts and uses the wrong details from a host that has no authority giving that information, then this technique is called …?
a) DNS hijacking
b) DNS lookup
c) DNS spoofing
d)All of the above
e)a and b f)None of the above - block cypher used by PGP to encrypts data…
a) international data encryption algorithm
b) internet data encryption algorithm
c) private data encryption algorithm
d) All of the above
- Pretty good privacy PGP(Pretty Good Privacy) is used in…
a) browser security
b) email security
c) FTP security
d) none of the mentioned
- The extensible authentication protocol is an authentication framework used in…
a) wired local area network
b) wireless networks
c) wired personal area network
d) all of the above
- What is used to carry traffic of one protocol over
the network that does not support that protocol directly…
a) Tunnelling
b) Trafficking
c) Transferring
d) Switching
- In which Mode the authentication header is inserted
immediately after the IP header…
a) Tunnel
b) Transport
c) Authentication
d) Both A and B
- Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection…
a) VNP
b) VSPN
c) VSN
d) VPN
- What term is considered as a basis for most robust authentication schemes…
a)Registration
b)Identification
c)Encryption
d)Refine information
- A method that uses two independent pieces/processes of information to identify a user is known as…
a)Authentication through encryption
b)Password-method authentication
c)Two-method authentication
d)Two-factor authentication
- Where the security enforcement is needed firstly…
a)Scripting
b)Application
c)Assigning Roles
Administration
- Which database allows a system administrator to associate a function with a relation…
a)Virtual database
b)Private database
c)Custom database
d)Virtual Private Database(VPD)
- Applications create queries dynamically, can be considered as a risk source of …
a)Active attacks
b)Passive attacks
c)Forgery
d)Injection