Latest Internet Security Interview Questions for Freshers

Latest Updated Internet Security Multiple choice Questions
What does IP mean?
A. Instant Protocol
B. Intellectual Property
C. Instance Principle
D. Internet Protocol
Ans: D
When cookies are used as session identifiers, how are they then used as a potential security hazard?
A. Attackers emulate users by stealing their cookies.
B. User’s cookies are altered to a virus-like state.
C. They emulate user’s by downloading all the victims information onto a virtual machine.
D. They emulate user’s by stealing their personal identity.
Ans: A
Which of the following is a VALID type of Key Management System?
A. Dynamic Key Management System
B. Integrated Key Management System
C. Third-Party Key Management System
D. Both Integrated Key Management System and Third-Party Key Management System
Ans: D
What are TLS and SSL?
A. Internet layers
B. Internet protocols.
C. Network layers.
D. Cryptographic protocols.
Ans: D
What is a computer worm?
A. It is malware designed to infect other computers.
B. It is software designed to exploit networks.
C. It is software designed to analyze and search for open ports.
D. It is a software utilized to scan packets on open networks.
Ans: A
Is a Unix-based system vulnerable to viruses?
A. Yes. The split is approximately 50/50 when it comes to attacks on Windows vs. Unix based systems.
B. No. Linux systems are totally impervious to attacks.
C. Yes, the majority of viruses attack Unix-based systems.
D. Yes, however the majority are coded to attack Windows-based systems.
Ans: D
There are two types of firewall. What are they?
A. Hardware and software.
B. Internet-based and home-based.
C. Digital and electronic.
D. Remote and local
Ans: A
Which of the following refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user’s consent?
A. Spyware
B. Trojan horse
C. Malware
D. Botnet
Ans: A
What does cross-site scripting allow for attackers?
A. A phishing attack that automatically downloads the victims personal information.
B. The introduction of worm viruses into the victims website.
C. Injection of client-side scripts into web pages.
D. Direct introduction of viruses into a victims computer.
Ans: C
Which of the following is a means to access a computer program or entire computer system bypassing all security mechanisms?
A. Backdoor
B. Trojan Horse
C. Phishing
D. Masquerading
Ans: A
Which of the following protocol used Port 443 and Port 80 respectively
A. HTTPS and HTTP
B. DHTML
C. HTTP and HTTPS
D. XHTML
Ans: A
What happens to your data when it is encrypted?
A. It is compressed, renamed, and archived.
B. It is transferred to a third party, encoded, then sent back.
C. It is scrambled to retain privacy from third-parties.
D. It is sent through a series of supercomputers to be compressed multiple times.
Ans: A
Which of the following is collection of Internet-connected programs communicating with other similar programs in order to perform tasks?
A. Malware
B. Trojan horse
C. Spyware
D. Botnet
Ans: D
If cookies with non-random sequence numbers are issued upon authentication, which of the following attack types can occur?
A. Session hijacking
B. Cross-site scripting
C. SQL injection
D. Directory traversal
Ans: A
Modern secure password storage should implement:
A. Salted plain-text values of the password
B. Hashed values of the password
C. Plain-text passwords stored in an encrypted database
D. Salted and hashed values of the password
Ans: D
What two main categories of network topologies are there?
A. Close and Distant
B. Direct and Indirect
C. Physical and logical.
D. Digital and Topological
Ans: C
What is one way that a web browser is vulnerable to breaching?
A. A virus can be sent through the monitor.
B. A browser plugin can be exploited.
C. Web browsers are impervious to exploitation.
D. A browser can be infected by closing it.
Ans: B
What is another name for an insecure plugin?
A. Software
B. Firmware
C. Malware
D. Hardware
Ans: C
True of False? Malware exists which affects both Windows and Linux systems.
A. True
B. False
Ans: A
In which of the following fraud methods is a legitimate/legal-looking email sent in an attempt to gather personal and financial information from recipients?
A. Masquerading
B. Malware
C. Virus
D. Phishing
Ans: D
Can a proxy be used as a firewall? If so, how?
A. No. All a proxy does is re-rout Internet traffic, and thus all the malicious signals that go with it.
B. No. Proxies are firewalls that are maintained at locations other than that of the user.
C. No. Proxies are data encryption stations whose sole purpose is to encrypt and re-rout data.
D. Yes. A proxy acts as a network intermediary for the user that serves to control the flow of incomming and outgoing traffic.
Ans: D
A digital signature scheme consists of which of the following typical algorithms ?
A. Signature verifying algorithm
B. Key generation algorithm
C. Signing algorithm
D. Key generation, Signing and Signature verifying algorithm
Ans: D
Which of the following is TRUE about TLS?
A. The message that ends the handshake sends a hash of all the exchanged handshake messages seen by both parties
B. The HMAC construction used by most TLS cipher suites is specified in RFC 2104
C. All of the given options are correct
D. Provides protection against a downgrade of the protocol to a previous (less secure) version or a weaker cipher suite
Ans: C
Which of the following are the basic functionalities of the IPsec Protocol ?
A. Security protocols for AH and ESP
B. Manual and automatic key management for the internet key exchange
C. All of the given options are correct
D. Security association for policy management and traffic processing
Ans: C
Which of the following involves submitting as many requests as possible to a single Internet computer or service, overloading it and preventing it from servicing legitimate requests?
A. Masquerading
B. Distributed denial-of-service attacks
C. Phishing
D. Backdoor
Ans: B
Which is the best way a system can be hardened?
A. Installing a commercial security suite.
B. Virus scanning only.
C. White-list ad filtering only.
D. Total disk encryption coupled with strong network security protocols.
Ans: D
Why is it crucial to encrypt data in transit?
A. So you can increase your chances of testing your encryption capabilities.
B. To assure that all of your information cannot be decrypted.
C. To decrease your resources.
D. To prevent unauthorized access to private networks and sensitive information during its most vulnerable state.
Ans: D
Is true that HTTP is an insecure protocol?
A. True
B. False
Ans: A
Which of the following is TRUE about SSL 3.0?
A. SSL 3.0 improved upon SSL 2.0 by adding SHA-1 based ciphers and support for certificate authentication
B. It has a weak MAC construction that uses the MD5 hash function with a secret prefix
C. It assumes a single service and a fixed domain certificate, which clashes with the standard feature of virtual hosting in Web servers
D. Identical cryptographic keys are used for message authentication and encryption
Ans: A
What is a computer virus?
A. A virus is the same as a cookie in that it is stored on your computer against your permission.
B. A virus is friendly software that is simply mislabled.
C. Malicious software that merely stays dormant on your computer.
D. Malicious software that inserts itself into other programs.
Ans: D
Which of the following symmetric keys can be derived from Symmetric master key?
A. Data encryption keys
B. Key wrapping keys
C. All of the given options are correct
D. Authentication keys
Ans: C
What is a firewall?
A. A firewall is a program that encrypts all the programs that access the Internet.
B. Firewalls are network-based security measures that control the flow of incoming and outgoing traffic.
C. Firewalls are interrupts that automatically disconnect from the internet when a threat appears.
D. A firewall is a program that keeps other programs from using the network.
Ans: B
Which of the following is valid difference between a Virus and a Spyware ?
A. Virus damages data, Spyware steals sensitive private information
B. Virus damages data and also steals sensitive private information
C. Spyware damages data, Virus steals sensitive private information
D. Spyware damages data and also steals sensitive private information
Ans: A
Which of the following are valid Cryptographic key types?
A. Private signature key
B. All of the given options are correct
C. Public authentication key
D. Public signature verification key
Ans: B
Digital signatures provide which of the following ?
A. Non-repudiation
B. authentication
C. integrity protection
D. All of the given options are correct
Ans: D
Which of the following are possible security threats?
A. All of the given options are correct
B. Masquerading
C. Backdoors
D. Illegitimate use
Ans: A
What happens during the TCP attack; Denial of Service?
A. A worm is loaded onto the victims computer to disable their keyboard.
B. A virus is sent to disable their dos prompt.
C. Viruses are sent to their ISP to deny them tech support.
D. Information is repeatedly sent to the victim to consume their system resources, causing them to shut down.
Ans: D
Which of the following is the collective name for Trojan horses, spyware, and worms?
A. Spware
B. Botnets
C. Virus
D. Malware
Ans: D
In which of the following protocols does a website (if accessed using the protocol) encrypt the session with a Digital Certificate?
A. TCP
B. XHTTP
C. HTTPS
D. SHTTP
Ans: C
Who was TLS defined by?
A. NSA
B. Internet Engineering Task Force
C. OSHA
D. The DEA
Ans: B
How to avoid Man-in-the-middle attacks?
A. Use HTTPS connections and verify the SSL certificate
B. Use connections without SSL
C. Accept every SSL certificate, even the broken ones
Ans: A
What is network topology?
A. It is the inner networkings of a single computer.
B. It is the top layer of a computer network.
C. It is the entirety of the data of a computer network.
D. It is the framework of the components of a computer network.
Ans: D
What is Internet Protocol Security?
A. Ways to disconnect your router in an emergency.
B. Methods to secure a disconnected computer.
C. Methods to secure your documents from physical breaches.
D. Methods to secure Internet Protocol (IP) communication.
Ans: D
What does TCP mean?
A. Total Content Positioning
B. Technical Control Panel
C. Transmittable Constant Protocol
D. Transmission Control Protocol
Ans: D
Which of the following is a valid Internet Security requirement?
A. All of the given options are correct
B. Integrity
C. Authentication
D. Confidentiality
Ans: A
What is another name for Internet Layer?
A. TCP layer
B. IP layer
C. SSL layer
D. Interwebs
Ans: B
Trojan Horse programs operate with what intent?
A. To do a series of brute force attacks within the system itself and a series of external attacks from other servers.
B. To masquerade as non-malicious software while exploiting a system’s weaknesses.
C. To slowly but surely infect and become your operating system until the system crashes.
D. To openly exploit a systems weaknesses until the user discovers it.
Ans: B
Which of the following is a general term for malicious software that pretends to be harmless so that a user willingly allows it to be downloaded onto the computer?
A. Virus
B. Spware
C. Botnets
D. Trojan Horse
Ans: D
Which of the following is an ITU-T standard for a public key infrastructure (PKI) and Privilege Management Infrastructure (PMI)?
A. X.507
B. X.519
C. X.508
D. X.509
Ans: D
If you set up a BUS network, what is the major disadvantage?
A. It is connected in a star pattern and can be disabled by disrupting one data center.
B. It is entirely wireless and open to wifi-based attacks.
C. It is linked with a single cable which can be a major vulnerability.
D. It is daisy-chained together with several cables.
Ans: C
What does the acronym BEAST mean in Beast Attack?
A. Browser Exploit Against SSL/TLS
B. Breach Entering Against SSL/TLS
C. Browser Extension And SSL/TLS
D. Breaking and Entering Against SSL/TLS
Ans: A
Why is a virtual machine considered a sandboxing method?
A. Virtual machines all have firewalls, virus scanners, and proxy connetions.
B. Virtual machines all have sandbox features installed on them.
C. All host resources are channeled through the emulator.
D. Virtual machines take the brunt of the attack, so the user is always safe.
Ans: C
Which of the following is a valid flaw of SSL 2.0 ?
A. Identical cryptographic keys are used for message authentication and encryption
B. All of the given options are correct
C. It has a weak MAC construction that uses the MD5 hash function with a secret prefix
D. It does not have any protection for the handshake
Ans: B
Which of the following is true about Public Key Encryption?
A. Only one person can encrypt with the public key and anyone can decrypt with the private key
B. Anyone can encrypt with the public key, only one person can decrypt with the private key
C. Anyone can encrypt with the private key, only one person can decrypt with the public key
D. Anyone can encrypt with the public key and anyone can decrypt with the private key
Ans: B
An SQL injection is often used to attack what?
A. Servers running SQL databases similar to Hadoop or Hive.
B. Small scale machines such as diebold ATMs.
C. Servers built on NoSQL
D. Large-scale SQL databases such as those containing credit card information.
Ans: D
Which of the following type of attack can actively modify communications or data?
A. Neither Active nor Passive attack
B. Passive attack
C. Both Active and Passive attack
D. Active attack
Ans: D
How are port numbers categorized?
A. Unknown, unregistered, invalid
B. Well-known, registered, and static/dynamic.
C. Static, dynamic, enigmatic
D. Known, well-known, unknown
Ans: B
Which of the following keys are used to generate random numbers?
A. Asymmetric random number generation keys
B. Public signature verification key
C. Symmetric random number generation keys
D. Symmetric and asymmetric random number generation keys
Ans: D
When is encrypted data the safest?
A. When it is being transferred via usb stick.
B. When it is at rest.
C. When it is being written.
D. When it is in transit.
Ans: B
What is largely considered the most advanced computer virus?
A. agent.biz
B. Conficker Virus
C. Stuxnet.
D. Zeus
Ans: C
Secure Sockets Layer is a predecessor of which cryptographic protocol?
A. HTTPS
B. IPSec
C. Transport Layer Security
D. SSL 3.0
Ans: C
What are the two primary classifications of cross-site scripting?
A. non-persistent and persistent.
B. traditional and non-persistent
C. traditional and DOM-based
D. DOM-based and persistent
Ans: A
According to OWASP what is the most dangerous web vulnerability?
A. Security Misconfiguration
B. Cross-site-scripting (XSS)
C. Sensitive Data Exposure
D. Cross-Site Request Forgery (CSRF)
E. Injections (SQL, LDAP, etc)
Ans: E
Which version of TLS is vulnerable to BEAST exploit?
A. TLS 1.0
B. TLS 0.5
C. TLS 2.0
D. TLS 3.0
E. TLS 1.1
Ans: A
Sandboxing does what to computer programs?
A. Sandboxes protect your programs by isolating all the other programs except the one you are using at the time.
B. Sandboxing protects your system by trapping all the viruses.
C. It separates and isolates them.
D. Sandboxing doesn’t protect your system.
Ans: C
Which of the following is a VALID authorization key?
A. Public authorization key
B. Symmetric authorization keys
C. Public ephemeral key authorization key
D. Asymmetric authorization keys
Ans: A
Which of the following threats corresponds with an attacker targeting specific employees of a company?
A. Spear phishing
B. Phishing
C. Man-in-the-middle
D. Pharming
Ans: A
How can cookies be used to mitigate cross-site scripting?
A. Cookies store an exact mirror copy of all a users web activity.
B. Cookies can be coded like a program to intercept script attacks.
C. They can’t. Cookies only store user information.
D. Cookies allow for cookie-based user authentication.
Ans: D
What does a cryptographic key do within the Internet Layer?
A. It specifies how encrypted data is transferred and to whom.
B. It is the specialized dataset that is able to decrypt cyphertext.
C. It specifies how transferred information is converted into cyphertext.
D. It converts it into encrypted language.
Ans: C
Which of the following keys are the private keys of asymmetric (public) key pairs that are used only once to establish one or more keys ?
A. Asymmetric random number generation keys
B. Public ephemeral key agreement key
C. Symmetric random number generation keys
D. Private ephemeral key agreement key
Ans: D
Which of the following is a VALID digital signature key?
A. Private signature key
B. Private signature authentication key
C. Public signature authentication key
D. Symmetric signature authentication key
Ans: A
Which of the following represents a cryptographic key that is generated for each execution of a key establishment process ?
A. Public authentication key
B. Private key transport key
C. Private ephemeral key agreement key
D. Public signature verification key
Ans: C
What is the less secure AES encryption mode?
A. OCB
B. ECB
C. CTR
D. CBC
E. CFB
Ans: D
Which of the following keys are used to encrypt other keys using symmetric key algorithms ?
A. Symmetric random number generation keys
B. Asymmetric random number generation keys
C. Public signature verification key
D. Symmetric key wrapping key
Ans: D
Which of the following represents a cryptographic key that is intended to be used for a long period of time?
A. Private key transport key
B. Public signature verification key
C. Public authentication key
D. Private static key agreement key
Ans: D
What is a method to fend off a Sockstress attack?
A. White-listing access to TCP services on critical systems.
B. Prepare a retaliatory DDOS attack.
C. Do nothing. It will pass on its own.
D. Black-listing access to TCP services on critical systems.
Ans: A
Which of the following enables secure and private data exchange/transfer on an unsecure public network ?
A. All of the given options are correct
B. Private Key Infrastructure
C. Virtual Key Infrastructure
D. Public Key Infrastructure
Ans: D
Which of the following is a VALID ephemeral key?
A. Public ephemeral key agreement key
B. Public ephemeral verification key
C. Symmetric ephemeral random number generation keys
D. Asymmetric ephemeral random number generation keys
Ans: A
Which of the following HTTP method is considered insecure ?
A. POST
B. DELETE
C. GET
D. TRACE
Ans: D
What does the Linux kernal use to sandbox running programs?
A. Linux doesn’t sandbox because it is impervious to any and all cyber attacks.
B. seccomp, or Secure Computing Mode
C. Linux uses a layered system of user authentication to perform sandbox-like functions.
D. Linux drives are fully encrypted, thus they don’t need sandboxing.
Ans: B
Which of the following is not a VALID type of firewall?
A. Circuit-level gateways
B. Application-level gateways
C. Proxy Server Gateways
D. Packet filters
Ans: C
Which of the following are the public keys of asymmetric key pairs that are used to encrypt keys using a public key algorithm ?
A. Private signature key
B. Public authentication key
C. Public signature verification key
D. Private key transport key
Ans: D
Which of the following are the public keys of asymmetric (public) key pairs that are used to encrypt keys using a public key algorithm?
A. Private key transport key
B. Private signature key
C. Public signature verification key
D. Public key transport key
Ans: D
In the sublayer of which of the following does TLS and SSL performs the data encryption of network connections?
A. application layer
B. session layer
C. Both session and presentation layer
D. presentation layer
Ans: A
All of the following are valid cryptographic hash functions EXCEPT:
A. RC4
B. RIPEMD
C. SHA-512
D. MD4
Ans: A
Which of the following is a standalone computer program that pretends to be a well-known program in order to steal confidential data ?
A. Fraudtool
B. Malware
C. SPWare
D. Spyware
E. Virus
Ans: A

Related

Interview Questions 5521510994492980691

Post a Comment

emo-but-icon

item