Web Security and forensics Multiple choice questionsBy: Prof. Dr. Fazal Rehman | Last updated: May 2, 2025 12 Score: 0 Attempted: 0/12 Subscribe 1. If a DNS server accepts and uses the wrong details from a host that has no authority giving that information, then this technique is called: (A) DNS hijacking (B) DNS lookup (C) DNS spoofing (D) All of the above 2. Block cipher used by PGP to encrypt data is: (A) International data encryption algorithm (B) Internet data encryption algorithm (C) Private data encryption algorithm (D) All of the above 3. Pretty Good Privacy (PGP) is used in: (A) Browser security (B) Email security (C) FTP security (D) None of the mentioned 4. The Extensible Authentication Protocol is an authentication framework used in: (A) Wired local area network (B) Wireless networks (C) Wired personal area network (D) All of the above 5. What is used to carry traffic of one protocol over the network that does not support that protocol directly? (A) Tunnelling (B) Trafficking (C) Transferring (D) Switching 6. In which mode is the authentication header inserted immediately after the IP header? (A) Tunnel (B) Transport (C) Authentication (D) Both A and B 7. Which of the following is an extension of an enterprise private intranet across a public network that creates a secure private connection? (A) VNP (B) VSPN (C) VSN (D) VPN 8. What term is considered as the basis for most robust authentication schemes? (A) Registration (B) Identification (C) Encryption (D) Refine information 9. A method that uses two independent pieces/processes of information to identify a user is known as: (A) Authentication through encryption (B) Password-method authentication (C) Two-method authentication (D) Two-factor authentication 10. Where is security enforcement needed first? (A) Scripting (B) Application (C) Assigning Roles (D) Administration 11. Which database allows a system administrator to associate a function with a relation? (A) Virtual database (B) Private database (C) Custom database (D) Virtual Private Database (VPD) 12. Applications that create queries dynamically can be considered as a risk source of: (A) Active attacks (B) Passive attacks (C) Forgery (D) Injection More MCQs of Networking Internet and Web Router MCQs Storage area network MCQs Networking Important MCQs Network Security MCQs Electrical Network Analysis MCQs Networking Programming MCQs Social Networks MCQs Network Layers OSI Model MCQs Digital Communication MCQs Telecommunication MCQs Transmission and switching MCQs Networking topologies Solved MCQs Computer Network MCQs for Lecturer Test Mobile and Wireless Network MCQs Cyber Crime Solved MCQs Internet Protocols MCQs Internet MCQs Web Security and forensics MCQs Web Security and forensics MCQs 2 Wireless Security MCQs Datalink layer OSI Model MCQs Physical Layer OSI Model MCQs 7 layers OSI Model MCQs Application Layer MCQs WIFI MCQs Internet and Email MCQs Networking MCQs Public Service Commission network administrator MCQs LINUX MCQ’s Linux File Permissions MCQs Linux File Permissions MCQs 2 Linux Startup and Shutdown MCQs Linux process Management MCQs More MCQs of Networking on T4Tutorials Related Posts:Web Security and forensics MCQsHow to maintain software security and application securityMCQs Preparation for Manager Digital Forensics and Malware AnalysisBasic Electronics Multiple choice questions MCQs - Questions AnswersWEP Reference Model, WER Web engineering resources Portal in Web EngineeringData Analysis And Design Multiple Choice Questions