Information Cyber Security Mock Test

1. In the _______ mode, IPSec protects the whole IP packet, including the original IP header.

2. Why would a hacker use a proxy server?

3. A digital signature needs a

4. What is one advantage of setting up a DMZ with two firewalls?

5. Imagine a social networking web app (like Twitter) that allows users to post short blurbs of text.

6. Which component is included in IP security?

7. What are the two primary classifications of cross-site scripting?

8. What is Firewall?

9. IPSec is designed to provide security at the _________

10. The root of DNS tree is____

11. SSL stands for?

12. The _____domains define registered hosts according to their generic behaviour.

13. What is the most important activity in system hacking?

14. The following specializations exist in digital investigations:

15. In the DNS the names are defined in _____ sturucture

16. A full domain name is sequence of lables seperated by____

17. A valid definition of digital evidence is:

18. Pretty good privacy (PGP) is used in ______

19. The features of traditional IPSes are found in all of these modern systems, except:

20. DNS can use services of________using the well known port 53

21. Computers can play the following roles in a crime:

22. How does machine learning benefit IDSes/IPSes?

23. It is quite difficult to fabricate an alibi on a network successfully because:

24. What are the three general categories of computer systems that can contain digital evidence?

25. Types of digital evidence that might corroborate an alibi include:

26. A digital Signature is

27. To demonstrate that someone is lying about an alibi, it is necessary to:

28. In terms of digital evidence, the Internet is an example of:

29. What is necessary for a cross-site script attack with cookies to be thwarted

30. An investigation can be hindered by the following:

31. Why would HTTP Tunneling be used?

32. Forensic analysis involves the following:

33. The domain name space (tree) is devided into---------different sections

34. The first step in applying the scientific method to a digital investigation is to:

35. The _______ mode is normally used when we need host-to-host (end-to-end) protection of data.

36. An HTTP connection uses port _________ whereas HTTPS uses port ____________ and invokes SSL

37. The crime scene preservation process includes all but which of the following:

38. What port does Telnet use?

39. When a cyberstalking case is stalled, it is a good idea to interview the victim again, because:

40. Conversion of plain text into Cipher text is called as________.

41. __________ means knowledge obtained from investigation, study , intelligence new ,facts .

42. Which One of them is Passive attack?

43. What is full form of DDoS?

44. In the course of conducting forensic analysis, which of the following actions are carried out?

45. The technique in which when one character is replaced by another Character is called as?

46. Security Measures Needed to protect ________ during their transmission

47. The full form of OSI is OSI model__.

48. Prevention of the unauthorised used of Resources refers too?

49. What is the 4th step in DES Algorithm?

50. A hacker guessing suggested password to a program is call as?

Computer Science Engineering Mock Tests with Answers
Distributed Computing System Mock Test
Software Project Management Mock Test
Artificial Intelligence and Robotics Mock Test
Basics of Database Management Mock Test
C# Programming Mock Test
C#.NET Programming Mock Test
Cloud Computing Mock Test
Communication Network Mock Test
Computer Architecture Mock Test
Computer Architecture and Organization Mock Test
Computer Fundamentals Mock Test
Computer Networking Mock Test
Computer Networks Mock Test
CPP Programming Mock Test
Data Analysis Mock Test
Data Communication and Computer Network Mock Test
Data Compression and Data Retrieval Mock Test
Data Mining and Business Intelligence Mock Test
Data Mining and Data Warehouse Mock Test
Data Structure and Algorithms Mock Test
Data Structures Mock Test
DataBase Management System Mock Test
Design and Analysis of Algorithms Mock Test
Digital Electronics and Logic Design Mock Test
Digital Logic Circuits Mock Test
Digital Principles and System Design Mock Test
Discrete Mathematics Mock Test
Discrete Structure Mock Test
DotNet Technology Mock Test
Embedded Real Time Operating System Mock Test
Green Computing Mock Test
High Performance Computing Mock Test
Information Cyber Security Mock Test
Information and Network Security Mock Test
Information Retrival Techniques Mock Test
Information Systems and Engineering Economics Mock Test
Machine Learning Mock Test
Microprocessor and Interfacing Technique Mock Test
Microprocessors Mock Test
Muli core Architectures and Pro Mock Test
Multi core processors Mock Test
Network Security Mock Test
Neural Networks and Fuzzy Control
Object Oriented Programming Mock Test
Operating System Architecture Mock Test
Operating System Mock Test
Problem Solving and Python Programming Mock Test
Programming for Problem Solving Mock Test
Python Programming Mock Test
Soft Computing Mock Test
Software Design Modeling Mock Test
Software Engineering Mock Test
Software Testing Mock Test
Software Testing and Quality Assurance Mock Test
Theory of Computation and Compiler Design Mock Test
Theory of Computation Mock Test
Ubiquitous Computing System Mock Test