These Internet Security multiple-choice questions and their answers will help you strengthen your grip on the subject of Internet Security. You can prepare for an upcoming exam or job interview with these Internet Security MCQs.
So scroll down and start answering.
A. Instance Principle
B. Intellectual Property
C. Instant Protocol
D. Internet Protocol
A. They emulate user's by downloading all the victims information onto a virtual machine.
B. User's cookies are altered to a virus-like state.
C. They emulate user's by stealing their personal identity.
D. Attackers emulate users by stealing their cookies.
A. True
B. False
A. HTTPS
B. XHTTP
C. SHTTP
D. TCP
A. Non-repudiation
B. integrity protection
C. authentication
D. All of the given options are correct
A. All of the given options are correct
B. Backdoors
C. Masquerading
D. Illegitimate use
A. Transmittable Constant Protocol
B. Technical Control Panel
C. Total Content Positioning
D. Transmission Control Protocol
A. All of the given options are correct
B. Integrity
C. Confidentiality
D. Authentication
A. Accept every SSL certificate, even the broken ones
B. Use connections without SSL
C. Use HTTPS connections and verify the SSL certificate
A. Methods to secure your documents from physical breaches.
B. Methods to secure a disconnected computer.
C. Ways to disconnect your router in an emergency.
D. Methods to secure Internet Protocol (IP) communication.
A. Information is repeatedly sent to the victim to consume their system resources, causing them to shut down.
B. A virus is sent to disable their dos prompt.
C. Viruses are sent to their ISP to deny them tech support.
D. A worm is loaded onto the victims computer to disable their keyboard.
A. Public authentication key
B. All of the given options are correct
C. Public signature verification key
D. Private signature key
A. Key wrapping keys
B. Data encryption keys
C. All of the given options are correct
D. Authentication keys
A. Spyware damages data, Virus steals sensitive private information
B. Virus damages data and also steals sensitive private information
C. Spyware damages data and also steals sensitive private information
D. Virus damages data, Spyware steals sensitive private information
A. A firewall is a program that keeps other programs from using the network.
B. A firewall is a program that encrypts all the programs that access the Internet.
C. Firewalls are interrupts that automatically disconnect from the internet when a threat appears.
D. Firewalls are network-based security measures that control the flow of incoming and outgoing traffic.
A. Virus scanning only.
B. Total disk encryption coupled with strong network security protocols.
C. Installing a commercial security suite.
D. White-list ad filtering only.
A. To decrease your resources.
B. So you can increase your chances of testing your encryption capabilities.
C. To prevent unauthorized access to private networks and sensitive information during its most vulnerable state.
D. To assure that all of your information cannot be decrypted.
A. Security association for policy management and traffic processing
B. Security protocols for AH and ESP
C. Manual and automatic key management for the internet key exchange
D. All of the given options are correct
A. Masquerading
B. Distributed denial-of-service attacks
C. Phishing
D. Backdoor
A. True
B. False
A. Yes. A proxy acts as a network intermediary for the user that serves to control the flow of incomming and outgoing traffic.
B. No. Proxies are firewalls that are maintained at locations other than that of the user.
C. No. All a proxy does is re-rout Internet traffic, and thus all the malicious signals that go with it.
D. No. Proxies are data encryption stations whose sole purpose is to encrypt and re-rout data.
A. Key generation, Signing and Signature verifying algorithm
B. Signing algorithm
C. Signature verifying algorithm
D. Key generation algorithm
A. Malware
B. Virus
C. Phishing
D. Masquerading
A. The HMAC construction used by most TLS cipher suites is specified in RFC 2104
B. The message that ends the handshake sends a hash of all the exchanged handshake messages seen by both parties
C. Provides protection against a downgrade of the protocol to a previous (less secure) version or a weaker cipher suite
D. All of the given options are correct
A. A virus can be sent through the monitor.
B. Web browsers are impervious to exploitation.
C. A browser plugin can be exploited.
D. A browser can be infected by closing it.
A. Malware
B. Software
C. Hardware
D. Firmware
A. It assumes a single service and a fixed domain certificate, which clashes with the standard feature of virtual hosting in Web servers
B. Identical cryptographic keys are used for message authentication and encryption
C. SSL 3.0 improved upon SSL 2.0 by adding SHA-1 based ciphers and support for certificate authentication
D. It has a weak MAC construction that uses the MD5 hash function with a secret prefix
A. It is software designed to analyze and search for open ports.
B. It is software designed to exploit networks.
C. It is malware designed to infect other computers.
D. It is a software utilized to scan packets on open networks.
A. Close and Distant
B. Physical and logical.
C. Direct and Indirect
D. Digital and Topological
A. Remote and local
B. Hardware and software.
C. Internet-based and home-based.
D. Digital and electronic.
A. Spyware
B. Botnet
C. Malware
D. Trojan horse
A. Dynamic Key Management System
B. Both Integrated Key Management System and Third-Party Key Management System
C. Third-Party Key Management System
D. Integrated Key Management System
A. Backdoor
B. Phishing
C. Masquerading
D. Trojan Horse
A. Session hijacking
B. Cross-site scripting
C. SQL injection
D. Directory traversal
A. HTTP and HTTPS
B. DHTML
C. HTTPS and HTTP
D. XHTML
A. Yes, however the majority are coded to attack Windows-based systems.
B. No. Linux systems are totally impervious to attacks.
C. Yes, the majority of viruses attack Unix-based systems.
D. Yes. The split is approximately 50/50 when it comes to attacks on Windows vs. Unix based systems.
A. Spware
B. Botnets
C. Virus
D. Malware
A. It is the framework of the components of a computer network.
B. It is the top layer of a computer network.
C. It is the inner networkings of a single computer.
D. It is the entirety of the data of a computer network.
A. Network layers.
B. Internet layers
C. Internet protocols.
D. Cryptographic protocols.
A. It is compressed, renamed, and archived.
B. It is scrambled to retain privacy from third-parties.
C. It is sent through a series of supercomputers to be compressed multiple times.
D. It is transferred to a third party, encoded, then sent back.
A. Direct introduction of viruses into a victims computer.
B. The introduction of worm viruses into the victims website.
C. Injection of client-side scripts into web pages.
D. A phishing attack that automatically downloads the victims personal information.
A. Malware
B. Trojan horse
C. Botnet
D. Spyware
A. Plain-text passwords stored in an encrypted database
B. Hashed values of the password
C. Salted plain-text values of the password
D. Salted and hashed values of the password
A. OSHA
B. Internet Engineering Task Force
C. The DEA
D. NSA
A. To openly exploit a systems weaknesses until the user discovers it.
B. To slowly but surely infect and become your operating system until the system crashes.
C. To masquerade as non-malicious software while exploiting a system's weaknesses.
D. To do a series of brute force attacks within the system itself and a series of external attacks from other servers.
A. SSL layer
B. TCP layer
C. IP layer
D. Interwebs
A. Breach Entering Against SSL/TLS
B. Browser Extension And SSL/TLS
C. Browser Exploit Against SSL/TLS
D. Breaking and Entering Against SSL/TLS
A. Anyone can encrypt with the public key, only one person can decrypt with the private key
B. Anyone can encrypt with the private key, only one person can decrypt with the public key
C. Only one person can encrypt with the public key and anyone can decrypt with the private key
D. Anyone can encrypt with the public key and anyone can decrypt with the private key
A. Botnets
B. Trojan Horse
C. Spware
D. Virus
A. Large-scale SQL databases such as those containing credit card information.
B. Small scale machines such as diebold ATMs.
C. Servers running SQL databases similar to Hadoop or Hive.
D. Servers built on NoSQL