Answer these 60 Information Security MCQs and assess your grip on the subject of Information Security.
Scroll below and get started!
A. A
B. B
C. C
D. D.
A. CPU
B. ESD
C. EPA
D. HVAC.
A. Manual.
B. Programmable.
C. Electronic.
D. Biometric.
A. MACs
B. POSs
C. SOPs
D. OPSs.
A. Content filtering
B. Secure site
C. Session cookie
D. Mobile security
A. Crypto service provider
B. Secure Shell (SSH)
C. Digital certificate
D. Key escrow
A. Compressed
B. Coauthor
C. Synced
D. Cloud
A. Certificate Repository (CR).
B. Digital Signature Permitted Authorization (DSPA)
C. Digital Signature Approval List ...
A. Providing anecdotal information
B. Narrative
C. Disinformation
D. Two to seven
A. Canadian pharmacy
B. Slammer
C. Melissa
D. Fake antivirus
A. Photoelectric
B. Air-aspirating
C. Smoke
D. Thermal.
A. Malicious insiders
B. Incident-response plan
C. Encryption
A. Evaluation
B. Modeling
C. Business understanding
D. Deployment.
A. GPS
B. RFID
C. ENCRYPTION
D. PDA
A. Time
B. Activity list
C. Critical path
D. Draft schedule
A. Performance statistics
B. Abandonment rate
C. Erlang measures
D. Adaptive tests.
A. CSIRT
B. Noise
C. HIDPS
D. Red
A. Field notes
B. Anti-forensics
C. Jump bag
D. Root cause Analysis
A. Time-share
B. Service bureau
C. Cold site.
D. Mobile site.
A. Electrostatic discharge
B. Incident
C. Slow onset disasters
D. Rapid onset disasters
A. Signature matching
B. Physically access
C. Indication
D. Anomaly-based IDPS
A. Formal class
B. Distance Learning
C. After-action review
D. Critical assets
A. After-action review
B. Cryptographic hash
C. Expectation of privacy
D. Forensic Toolkit (FTK)
A. Storage recovery
B. Vendor contact
C. Alert message
D. Systems recovery
A. Network recovery
B. Data management
C. Data recovery
D. Response phase
A. Malware hoax
B. Hybrid
C. Concurrent
D. User reports of system unavailability
A. Hybrid
B. Matrix
C. Private
D. Blended
A. Jump bag.
B. Field notes
C. Evidence seals
D. Root cause Analysis
A. Password
B. Honeytoken
C. Semiannually
D. Intrusion detection and prevention
A. Router
B. Worms
C. Trojan horses
D. Surveillance
A. IP
B. DHCP
C. MAC
D. HTTP
A. Direct
B. Subject
C. Hash
D. None of this
A. 1868
B. 1988
C. 1978
D. 1998
A. Knowledge
B. Encryption
C. Padded cell
D. Confidence
A. Audit; enforcement
B. Rigidity; adaptability
C. Protocols; the backing of iso
D. Compliance; subjectivity
A. Proxy
B. 5
C. Mirroring
D. Britain
A. Availability
B. Subject
C. Officer
D. Information
A. Issue delta
B. Objective
C. Performance gap
D. Risk assessment
A. Education
B. Awareness
C. Training
D. Professional development
A. Alarm filtering
B. Partially distributed
C. NIDPSs
A. Salesforce
B. Resource
C. Microsoft
D. Biometrics
A. Vulnerability
B. Attack
C. Social engineering
D. None of this
A. Multiplexing
B. Stego-key
C. Covertext
D. Covert channel
A. True
B. False
A. Audio files.
B. Video files.
C. Browsers.
D. Graphics.
A. Binary
B. Ternary
C. Weak
D. Unary
A. Reduction
B. Risk
C. Management
D. Data
A. At the host itself and the server
B. The firewall and the LAN
C. The proxy server and the LAN
D. The host and the firewall
A. Byte
B. USB
C. Bit
D. Data
E. RAM
A. Database
B. Table
C. Map
D. Intelligence