AKTU computer system security (CSS) Quizzes

 

CSS multiple-choice questions for AKTU Examination and another competitive exam


 Here we are going to discuss top 50 CSS multiple choice questions. these questions will help you at the many places like in examinations. in an interview etc. So lets start--





1. What type of symmetric key algorithm using a streaming cipher to encrypt information?
   
    A. RC4       
    B. Blowfish
    C. SHA 
    D. MD5
Ans-A


2. Charles Babbage invented
    A. ENIAC                
    B. Difference Engine
    C. Electronic Computer  
    D. Punched Card
Ans-B


3. What type of attack uses a fraudulent server with a relay address?
   A. NTLM          
   B. MITM      
   C. NetBIOS       
   D. SMB
Ans-(B)


4. What is the maximum character Linux supports in its filenames?
   
   A. 8           
   B. 128
   C. 256         
   D. Unlimited
Ans:-C


5. Which of the following is independent malicious program that need not any host program?
   A. Trap doors     
   B. Trojan horse
   C. Virus          
   D. Worm
Ans:-D


6. In tunnel mode IPsec protects the
    A. Entire IP packet       
    B. IP header
    C. IP payload             
    D. None of the mentioned
Ans:-A


7. A Extensible authentication protocol is authentication framework frequently used in
    A. Wired personal area network    
    B. Wireless networks
    C. Wired local area network       
    D. None of the mentioned
Ans:-B


8. Which of the following is known as Malicious software?
    
    A. illegalware            B. Badware
    C. Malware                D. Maliciousware
Ans:-C


9. Which of the following is NOT an example of a smartcard?
   A. a credit card which can be used to operate a mobile phone 
   B. an electronic money card e.g Mondex
   C. a drivers licence containing current information about bookings etc
   D. an access control card containing a digitised photo
Ans:-D


10. Code red is an ----------
    A. Word Processing Software    
    B. Antivirus
    C. Virus                       
    D. Photo Editing Software
Ans:-C


11.Firewalls are to protect against
   (A) Virus Attacks          (B) Fire Attacks
   (C) Data Driven Attacks    (D) Unauthorized Attacks
Ans:-D


12.The first computer virus is
   (A) The famous    (B) HARLIE
   (C) PARAM         (D) Creeper
Ans:-D


13.A hard copy would be prepared on a
  (A) Printer        (B) Joystick
  (C) Trackball      (D) All of these
Ans:-A


14.The first PC virus was developed in
  (A) 1980        (B) 1986
  (C) 1988        (D) 1999
Ans:-B


16.Joystick allows the movements with
   (A) 90 degree angle     (B) 180 degree angle
   (C) 360 degree angle    (D) 45 degree angle
Ans:- C


17.To protect system, there is how many levels of security level?
   (A) One       (B) Two
   (C) Three     (D) Four
Ans:- C


18.Lowest level of security system is
   (A) A       (B) B
   (C) C       (D) D
Ans:- A


19.The security of a system can be improved by
   (A) Audit log         (B) Threat monitoring
   (C) Both (a) and (b)  (D) None of these
Ans:- B


20.How many capabilities in CAP?
   (A) One         (B) Two
   (C) Three       (D) Four
Ans:- B


21.CAP is
   (A) Simple and greater power than that of hydra
   (B) Complex and less powerful than that of hydra
   (C) Simpler and less powerful than that of hydra
   (D) None of these
Ans:- C


22.Which one of the following is a key function of firewall?
   (A) Copying          (B) Moving
   (C) Deleting         (D) Monitoring
Ans:- D


23.Which memory is nonvolatile and may be written only once?
   (A) PROM        (B) RAM
   (C) EP-ROM      (D) SRAM
Ans:- D


24.Unauthorized copying of software to be used for personal gain of personal backups is called
   (A) Program looting     (B) Program thievery
   (C) Data snatching      (D) Software piracy
Ans:- D


25.Like a virus , it is a self-replicating program it also propagates through computer network
   (A) Phishing scam     (B) Worm
   (C) Spyware           (D) Cracker
Ans:- A


26.Multiple processor configurations
   (A) Are very efficient, but only on some applications
   (B) Work equally well on all applications
   (C) Are less efficient than scalar configurations
   (D) Are more efficient than scalar configurations
Ans:- A


27.Applications
   (A) Must usually be re-complied to use multiple processors
   (B) Can always be made efficient on multiple processors
   (C) Immediately run on multiple processors
   (D) Cannot run on multiple processors
Ans:- A


28.Seeks analysis is
   (A) Only shown on real-time displays
   (B) Used for analyzing control-unit busy problems
   (C) Used for analyzing device busy problems
   (D) Used for analyzing paging problems
Ans:- C


29.The most common security failure is
   (A) Depending on passwords
   (B) Carelessness by users
   (C) Too much emphasis on preventing physical access
   (D) Insufficient technology used to prevent breaches
Ans:- D


30.Trojan-Horse programs
   (A) Usually are immediately discovered
   (B) Really do not usually work
   (C) Are hacker programs that do not show up on the system
   (D) Are legitimate programs that allow unauthorized access
Ans:- D


31.First boot sector virus is
   (A) Computed       (B) Mind
   (C) Brain          (D) Elk cloner
Ans:- C


32.The linking of computers with a communication system is called
   (A) Assembling       (B) Interlocking
   (C) Pairing          (D) Networking
Ans:- D


33.The phrase ____ describe viruses, worms, Trojan horse attack applets and attack scripts.
   (A) Spam          (B) Phishing
   (C) Malware       (D) Virus
Ans:- C


34.Abuse messaging systems to send unsolicited is
   (A) Phishing         (B) Adware
   (C) Firewall         (D) Spam
Ans:- D


35.A person who uses his or her expertise to gain access to other people’s computers to get information    illegally or do damage is a
   (A) Hacker    (B) Analyst
   (C) Spammer   (D) Programmer
Ans:- A


36.Malicious access are unauthorized
   (A) Destruction of data
   (B) Modification of data
   (C) Reading of data
   (D) All of these
Ans:- C


37.Encrypted passwords are used for
   (A) Security purpose
   (B) Passwords list secret
   (C) Faster execution
   (D) Both (a) and (b)
Ans:- D


38.A firewall
  (A) Separates a network into multiple domains
  (B) May need to allow http to pass
  (C) Limits network access between the two security domains and maintains and logs all connections
  (D) is a computer or router that sits between the trusted and untrusted
Ans:- A


39.Link encryption
  (A) Is used only to detect errors
  (B) Cannot be used in a large network
  (C) Is less secure than end-to-end encryption
  (D) Is more secure than end-to-end encryption
Ans:- C


40.A high paging rate
   (A) Always creates a slow system
   (B) Is a symptom of too much processor activity
   (C) Keeps the system running well
   (D) May also cause a high I/O rate
Ans:- D


41.A program designed to destroy data on your computer which can travel to “infect” other computers is called a _____
   (A) Virus
   (B) Disease
   (C) Hurricane
   (D) Torpedo
Ans:- A


42._____ are often delivered to PC through an E-mail attachment and are often designed to do harm.
  (A) Email messages
  (B) Portals
  (C) Spam
  (D) Viruses
Ans:- C


43.A hacker contacts your phone or E-mails and attempts to acquire your password is called
   (A) Spamming
   (B) Bugging
   (C) Spoofing
   (D) Phishing
Ans:- D


44.Hackers often gain entry to a network be pretending to be at a legitimate computer
   (A) IP spoofing
   (B) Forging
   (C) Spoofing
   (D) None of these
Ans:- A


45.Some viruses have delayed payload, which is sometimes called a
   (A) Bomb
   (B) Anti-virus
   (C) Time
   (D) All of these
Ans:- A


46.The most difficult problem with co-processors is
   (A) Keeping all processors busy
   (B) Managing shared resources
   (C) Finding suitable applications
   (D) Cost
Ans:- A


47.Opportunity for misuse when
   (A) Program written by one user and used by another user
   (B) Program written by one user
   (C) Program used by another user
   (D) None of these
Ans:- A


48.Main motto of CAP system is
   (A) System provides him with no library of procedures to be used
   (B) Use of software capability has allowed them to relative considerable economics in formulating and implementing protection policies
   (C) Both (a) and (b)
   (D) None of these
Ans:- C


49.Resources are managed
   (A) By sophisticated locking mechanisms
   (B) More easily with multiple processors
   (C) By only one processor
   (D) With each processor equally
Ans:- A


50.Control-unit busy
   (A) Can be prevented with more devices
   (B) Can be prevented by reducing the paging rate
   (C) Shows the availability of the path of devices
   (D) Is the same as device busy
Ans:- C




Post a Comment

1 Comments

  1. The Casino is open in Phoenix - KTNV
    The Casino 사천 출장샵 will provide gambling, dining, entertainment and shopping at its location in 군산 출장샵 Las Vegas. Tickets and information 안성 출장안마 will be available at the Jan 6, 2022The Pool After DarkJan 7, 2022The 서산 출장안마 ChainsmokersJan 9, 2022Lionel 안동 출장안마 Richie

    ReplyDelete