Internet Security MCQs

Internet Security MCQs

These Internet Security multiple-choice questions and their answers will help you strengthen your grip on the subject of Internet Security. You can prepare for an upcoming exam or job interview with these Internet Security MCQs.
So scroll down and start answering.

1: What does IP mean?

A.   Instance Principle

B.   Intellectual Property

C.   Instant Protocol

D.   Internet Protocol

2: When cookies are used as session identifiers, how are they then used as a potential security hazard?

A.   They emulate user's by downloading all the victims information onto a virtual machine.

B.   User's cookies are altered to a virus-like state.

C.   They emulate user's by stealing their personal identity.

D.   Attackers emulate users by stealing their cookies.

3: Is true that HTTP is an insecure protocol?

A.   True

B.   False

4: In which of the following protocols does a website (if accessed using the protocol) encrypt the session with a Digital Certificate?

A.   HTTPS

B.   XHTTP

C.   SHTTP

D.   TCP

5: Digital signatures provide which of the following ?

A.   Non-repudiation

B.   integrity protection

C.   authentication

D.   All of the given options are correct

6: Which of the following are possible security threats?

A.   All of the given options are correct

B.   Backdoors

C.   Masquerading

D.   Illegitimate use

7: What does TCP mean?

A.   Transmittable Constant Protocol

B.   Technical Control Panel

C.   Total Content Positioning

D.   Transmission Control Protocol

8: Which of the following is a valid Internet Security requirement?

A.   All of the given options are correct

B.   Integrity

C.   Confidentiality

D.   Authentication

9: How to avoid Man-in-the-middle attacks?

A.   Accept every SSL certificate, even the broken ones

B.   Use connections without SSL

C.   Use HTTPS connections and verify the SSL certificate

10: What is Internet Protocol Security?

A.   Methods to secure your documents from physical breaches.

B.   Methods to secure a disconnected computer.

C.   Ways to disconnect your router in an emergency.

D.   Methods to secure Internet Protocol (IP) communication.

11: What happens during the TCP attack; Denial of Service?

A.   Information is repeatedly sent to the victim to consume their system resources, causing them to shut down.

B.   A virus is sent to disable their dos prompt.

C.   Viruses are sent to their ISP to deny them tech support.

D.   A worm is loaded onto the victims computer to disable their keyboard.

12: Which of the following are valid Cryptographic key types?

A.   Public authentication key

B.   All of the given options are correct

C.   Public signature verification key

D.   Private signature key

13: Which of the following symmetric keys can be derived from Symmetric master key?

A.   Key wrapping keys

B.   Data encryption keys

C.   All of the given options are correct

D.   Authentication keys

14: Which of the following is valid difference between a Virus and a Spyware ?

A.   Spyware damages data, Virus steals sensitive private information

B.   Virus damages data and also steals sensitive private information

C.   Spyware damages data and also steals sensitive private information

D.   Virus damages data, Spyware steals sensitive private information

15: What is a firewall?

A.   A firewall is a program that keeps other programs from using the network.

B.   A firewall is a program that encrypts all the programs that access the Internet.

C.   Firewalls are interrupts that automatically disconnect from the internet when a threat appears.

D.   Firewalls are network-based security measures that control the flow of incoming and outgoing traffic.

16: Which is the best way a system can be hardened?

A.   Virus scanning only.

B.   Total disk encryption coupled with strong network security protocols.

C.   Installing a commercial security suite.

D.   White-list ad filtering only.

17: Why is it crucial to encrypt data in transit?

A.   To decrease your resources.

B.   So you can increase your chances of testing your encryption capabilities.

C.   To prevent unauthorized access to private networks and sensitive information during its most vulnerable state.

D.   To assure that all of your information cannot be decrypted.

18: Which of the following are the basic functionalities of the IPsec Protocol ?

A.   Security association for policy management and traffic processing

B.   Security protocols for AH and ESP

C.   Manual and automatic key management for the internet key exchange

D.   All of the given options are correct

19: Which of the following involves submitting as many requests as possible to a single Internet computer or service, overloading it and preventing it from servicing legitimate requests?

A.   Masquerading

B.   Distributed denial-of-service attacks

C.   Phishing

D.   Backdoor

20: True of False? Malware exists which affects both Windows and Linux systems.

A.   True

B.   False

21: Can a proxy be used as a firewall? If so, how?

A.   Yes. A proxy acts as a network intermediary for the user that serves to control the flow of incomming and outgoing traffic.

B.   No. Proxies are firewalls that are maintained at locations other than that of the user.

C.   No. All a proxy does is re-rout Internet traffic, and thus all the malicious signals that go with it.

D.   No. Proxies are data encryption stations whose sole purpose is to encrypt and re-rout data.

22: A digital signature scheme consists of which of the following typical algorithms ?

A.   Key generation, Signing and Signature verifying algorithm

B.   Signing algorithm

C.   Signature verifying algorithm

D.   Key generation algorithm

A.   Malware

B.   Virus

C.   Phishing

D.   Masquerading

24: Which of the following is TRUE about TLS?

A.   The HMAC construction used by most TLS cipher suites is specified in RFC 2104

B.   The message that ends the handshake sends a hash of all the exchanged handshake messages seen by both parties

C.   Provides protection against a downgrade of the protocol to a previous (less secure) version or a weaker cipher suite

D.   All of the given options are correct

25: What is one way that a web browser is vulnerable to breaching?

A.   A virus can be sent through the monitor.

B.   Web browsers are impervious to exploitation.

C.   A browser plugin can be exploited.

D.   A browser can be infected by closing it.

26: What is another name for an insecure plugin?

A.   Malware

B.   Software

C.   Hardware

D.   Firmware

27: Which of the following is TRUE about SSL 3.0?

A.   It assumes a single service and a fixed domain certificate, which clashes with the standard feature of virtual hosting in Web servers

B.   Identical cryptographic keys are used for message authentication and encryption

C.   SSL 3.0 improved upon SSL 2.0 by adding SHA-1 based ciphers and support for certificate authentication

D.   It has a weak MAC construction that uses the MD5 hash function with a secret prefix

28: What is a computer worm?

A.   It is software designed to analyze and search for open ports.

B.   It is software designed to exploit networks.

C.   It is malware designed to infect other computers.

D.   It is a software utilized to scan packets on open networks.

29: What two main categories of network topologies are there?

A.   Close and Distant

B.   Physical and logical.

C.   Direct and Indirect

D.   Digital and Topological

30: There are two types of firewall. What are they?

A.   Remote and local

B.   Hardware and software.

C.   Internet-based and home-based.

D.   Digital and electronic.

A.   Spyware

B.   Botnet

C.   Malware

D.   Trojan horse

32: Which of the following is a VALID type of Key Management System?

A.   Dynamic Key Management System

B.   Both Integrated Key Management System and Third-Party Key Management System

C.   Third-Party Key Management System

D.   Integrated Key Management System

33: Which of the following is a means to access a computer program or entire computer system bypassing all security mechanisms?

A.   Backdoor

B.   Phishing

C.   Masquerading

D.   Trojan Horse

34: If cookies with non-random sequence numbers are issued upon authentication, which of the following attack types can occur?

A.   Session hijacking

B.   Cross-site scripting

C.   SQL injection

D.   Directory traversal

35: Which of the following protocol used Port 443 and Port 80 respectively

A.   HTTP and HTTPS

B.   DHTML

C.   HTTPS and HTTP

D.   XHTML

36: Is a Unix-based system vulnerable to viruses?

A.   Yes, however the majority are coded to attack Windows-based systems.

B.   No. Linux systems are totally impervious to attacks.

C.   Yes, the majority of viruses attack Unix-based systems.

D.   Yes. The split is approximately 50/50 when it comes to attacks on Windows vs. Unix based systems.

37: Which of the following is the collective name for Trojan horses, spyware, and worms?

A.   Spware

B.   Botnets

C.   Virus

D.   Malware

38: What is network topology?

A.   It is the framework of the components of a computer network.

B.   It is the top layer of a computer network.

C.   It is the inner networkings of a single computer.

D.   It is the entirety of the data of a computer network.

39: What are TLS and SSL?

A.   Network layers.

B.   Internet layers

C.   Internet protocols.

D.   Cryptographic protocols.

40: What happens to your data when it is encrypted?

A.   It is compressed, renamed, and archived.

B.   It is scrambled to retain privacy from third-parties.

C.   It is sent through a series of supercomputers to be compressed multiple times.

D.   It is transferred to a third party, encoded, then sent back.

41: What does cross-site scripting allow for attackers?

A.   Direct introduction of viruses into a victims computer.

B.   The introduction of worm viruses into the victims website.

C.   Injection of client-side scripts into web pages.

D.   A phishing attack that automatically downloads the victims personal information.

42: Which of the following is collection of Internet-connected programs communicating with other similar programs in order to perform tasks?

A.   Malware

B.   Trojan horse

C.   Botnet

D.   Spyware

43: Modern secure password storage should implement:

A.   Plain-text passwords stored in an encrypted database

B.   Hashed values of the password

C.   Salted plain-text values of the password

D.   Salted and hashed values of the password

44: Who was TLS defined by?

A.   OSHA

B.   Internet Engineering Task Force

C.   The DEA

D.   NSA

45: Trojan Horse programs operate with what intent?

A.   To openly exploit a systems weaknesses until the user discovers it.

B.   To slowly but surely infect and become your operating system until the system crashes.

C.   To masquerade as non-malicious software while exploiting a system's weaknesses.

D.   To do a series of brute force attacks within the system itself and a series of external attacks from other servers.

46: What is another name for Internet Layer?

A.   SSL layer

B.   TCP layer

C.   IP layer

D.   Interwebs

47: What does the acronym BEAST mean in Beast Attack?

A.   Breach Entering Against SSL/TLS

B.   Browser Extension And SSL/TLS

C.   Browser Exploit Against SSL/TLS

D.   Breaking and Entering Against SSL/TLS

48: Which of the following is true about Public Key Encryption?

A.   Anyone can encrypt with the public key, only one person can decrypt with the private key

B.   Anyone can encrypt with the private key, only one person can decrypt with the public key

C.   Only one person can encrypt with the public key and anyone can decrypt with the private key

D.   Anyone can encrypt with the public key and anyone can decrypt with the private key

49: Which of the following is a general term for malicious software that pretends to be harmless so that a user willingly allows it to be downloaded onto the computer?

A.   Botnets

B.   Trojan Horse

C.   Spware

D.   Virus

50: An SQL injection is often used to attack what?

A.   Large-scale SQL databases such as those containing credit card information.

B.   Small scale machines such as diebold ATMs.

C.   Servers running SQL databases similar to Hadoop or Hive.

D.   Servers built on NoSQL