1. In the _______ mode, IPSec protects the whole IP packet, including the original IP header. tunnel transport neither transport nor tunnel either transport or tunnel 2. Why would a hacker use a proxy server? to obtain a remote access connection to create a stronger connection with the target. to create a ghost server on the network. to hide malicious activity on the network. 3. A digital signature needs a public-key system shared-key system private-key system All of the options 4. What is one advantage of setting up a DMZ with two firewalls? you can do stateful packet filtering ??improved network performance you can control where traffic goes in three networks you can do load balancing 5. Imagine a social networking web app (like Twitter) that allows users to post short blurbs of text. packet sniffing sql injection cross-site scripting and sql injection cross-site scripting 6. Which component is included in IP security? encapsulating security payload (esp) internet key exchange (ike) authentication header (ah) all of the options 7. What are the two primary classifications of cross-site scripting? traditional and dom based traditional and non-persistent dom based and persistent non-persistent and persistent 8. What is Firewall? firewalls are network based security measures that control the flow of incoming and outgoing traffic firewall are the interrupts that automatically disconnect from the internet when a threat appears. a firewall is a program that keeps other programs from using the internet firewall is a program that encrypts all programs that access the internet 9. IPSec is designed to provide security at the _________ application layer session layer transport layer network layer 10. The root of DNS tree is____ an empty string a string of 63 characters a string of characters None of the options 11. SSL stands for? system secured layer secured shell layer secured socket layer system socket layer 12. The _____domains define registered hosts according to their generic behaviour. country inverse generic None of the options 13. What is the most important activity in system hacking? cracking passwords covering tracks escalating privileges information gathering 14. The following specializations exist in digital investigations: first responder (a.k.a. digital crime scene technician) forensic examiner digital investigator all of the options 15. In the DNS the names are defined in _____ sturucture a graph an invertred tree a linear list None of the options 16. A full domain name is sequence of lables seperated by____ colons semicolons dots None of the options 17. A valid definition of digital evidence is: any digital evidence on a computer data stored or transmitted using a computer digital data of probative value None of the options 18. Pretty good privacy (PGP) is used in ______ browser security ftp security wifi security email security 19. The features of traditional IPSes are found in all of these modern systems, except: antimalware unified threat management appliances network behavior analysis systems next-generation firewalls 20. DNS can use services of________using the well known port 53 udp either udp or tcp tcp none of the options 21. Computers can play the following roles in a crime: target, object, and subject evidence, instrumentality, contraband, or fruit of crime symbol, instrumentality, and source of evidence object, evidence, and tool 22. How does machine learning benefit IDSes/IPSes? by searching for similar patterns to known attacks by helping identify signatures more quickly by adding heuristic anomaly detection capabilities by lowering the volume of attacks analyzed 23. It is quite difficult to fabricate an alibi on a network successfully because: an offender would need system administrator access level to make the necessary changes. creating an alibi on a network could take months of work. an offender may not have the proper access. an individual rarely has the ability to falsify digital evidence on all the computers that are involved. 24. What are the three general categories of computer systems that can contain digital evidence? open computer systems, communication systems, embedded systems hardware, software, networks desktop, laptop, server personal computer, internet, mobile telephone 25. Types of digital evidence that might corroborate an alibi include: gps information from mobile devices indicating the users location and time computer records from credit cards, the telephone company, or subway ticket usage evidence of computer usage when the offense was supposed to occurred all of the options 26. A digital Signature is a bit string giving identity of a correspondent a unique identification of a sender an encrypted signature of sender an authentication of an electronic record by trying it uniquely to a key only a sender knows 27. To demonstrate that someone is lying about an alibi, it is necessary to: require the suspect to submit to a polygraph show that no evidence confirming the alibi is available interrogate the suspect using a number of methods find evidence that clearly demonstrates the lie 28. In terms of digital evidence, the Internet is an example of: open computer systems communication systems embedded computer systems none of the options 29. What is necessary for a cross-site script attack with cookies to be thwarted virtual machines firewalls captchas proxies 30. An investigation can be hindered by the following: offender concealment behavior improperly handled evidence preconceived theories all of the options 31. Why would HTTP Tunneling be used? to bypass a firewall to identify proxy servers http is a easy protocol to work with web activity is not scanned 32. Forensic analysis involves the following: assessment, experimentation, fusion, correlation, and validation seizure and preservation recovery, harvesting, filtering, organization, and search all of the options 33. The domain name space (tree) is devided into---------different sections 2 4 3 None of the options 34. The first step in applying the scientific method to a digital investigation is to: make one or more observations based on events that occurred form a conclusion based on the results of your findings experiment or test the available evidence to confirm or refute your prediction form a theory on what may have occurred 35. The _______ mode is normally used when we need host-to-host (end-to-end) protection of data. transport tunnel either transport or tunnel neither transport nor tunnel 36. An HTTP connection uses port _________ whereas HTTPS uses port ____________ and invokes SSL 80; 443 60; 620 40; 80 620; 80 37. The crime scene preservation process includes all but which of the following: confirming system date and time controlling access to the crime scene acquiring digital evidence protecting against unauthorized alterations 38. What port does Telnet use? 22 23 80 20 39. When a cyberstalking case is stalled, it is a good idea to interview the victim again, because: the victim might have been withholding information during the first interview. the information that investigators have gathered might help the victim recall additional details. the time between the first and second interviews has given the victim time to seek counseling. none of the options 40. Conversion of plain text into Cipher text is called as________. encryption decryption hidden text None of the options 41. __________ means knowledge obtained from investigation, study , intelligence new ,facts . security information data none of the options 42. Which One of them is Passive attack? replay previous message obtain message contain modify message in transit denial of service 43. What is full form of DDoS? derived denial of service denial of service distributed denial of service none of the options 44. In the course of conducting forensic analysis, which of the following actions are carried out? validation critical thinking fusion all of the options 45. The technique in which when one character is replaced by another Character is called as? combinational substitution transposition none of the options 46. Security Measures Needed to protect ________ during their transmission packet data file all of the options 47. The full form of OSI is OSI model__. open connection open systems interconnection open system internet open software interconnection 48. Prevention of the unauthorised used of Resources refers too? acess control data confidentiality data integrity none of the options 49. What is the 4th step in DES Algorithm? expansion permutation s-box substitution key transformation p-box permutation 50. A hacker guessing suggested password to a program is call as? default password attack dictionary attack password guessing none of the options Submit Answers Retake Test More Computer Science Engineering Study Material › Computer Science Engineering Mock Tests with Answers Distributed Computing System Mock Test Software Project Management Mock TestArtificial Intelligence and Robotics Mock TestBasics of Database Management Mock TestC# Programming Mock TestC#.NET Programming Mock TestCloud Computing Mock TestCommunication Network Mock TestComputer Architecture Mock TestComputer Architecture and Organization Mock TestComputer Fundamentals Mock TestComputer Networking Mock TestComputer Networks Mock TestCPP Programming Mock TestData Analysis Mock TestData Communication and Computer Network Mock TestData Compression and Data Retrieval Mock TestData Mining and Business Intelligence Mock TestData Mining and Data Warehouse Mock TestData Structure and Algorithms Mock TestData Structures Mock TestDataBase Management System Mock TestDesign and Analysis of Algorithms Mock TestDigital Electronics and Logic Design Mock TestDigital Logic Circuits Mock TestDigital Principles and System Design Mock TestDiscrete Mathematics Mock TestDiscrete Structure Mock TestDotNet Technology Mock TestEmbedded Real Time Operating System Mock TestGreen Computing Mock TestHigh Performance Computing Mock TestInformation Cyber Security Mock TestInformation and Network Security Mock TestInformation Retrival Techniques Mock TestInformation Systems and Engineering Economics Mock TestMachine Learning Mock TestMicroprocessor and Interfacing Technique Mock TestMicroprocessors Mock TestMuli core Architectures and Pro Mock TestMulti core processors Mock TestNetwork Security Mock TestNeural Networks and Fuzzy Control Object Oriented Programming Mock TestOperating System Architecture Mock TestOperating System Mock TestProblem Solving and Python Programming Mock TestProgramming for Problem Solving Mock TestPython Programming Mock TestSoft Computing Mock TestSoftware Design Modeling Mock TestSoftware Engineering Mock TestSoftware Testing Mock TestSoftware Testing and Quality Assurance Mock TestTheory of Computation and Compiler Design Mock TestTheory of Computation Mock TestUbiquitous Computing System Mock Test Computer Science Engineering Mock Tests