Sem-6, Cyber Security
Sem-6, Cyber Security
G College (Reaccredited
by NAAC with ‘B’ grade) Department of
computer sciences
B.com Computer Applications III
Year VI- Semester
Subject: - CYBER SECURITY
UNIT: 1
MULTIPLE CHOICE QUESTIONS:
1.What words consist in hacktivism? [ ]
(a) Hack acknowledge (b) hack active acknowledge ( c )
Hack N activism (d) Hack N acknowledge
2.What malware program demands ransome from victims? [ ]
(a) Ransomeware (b) Ransome trojan
( c ) virus money (d) active ransome
3.Which of the following refers to the violation of the principles if a computer is no more accessible?
[c]
(a) Access control (b) confidentiality
( c) Availability (d) information of things
4.Which of the following is not a cyber threat? [ ]
(a) Cyber warfare (b) cyber crime
( c ) cyber terrorism (d) none of the above
5.Which of the following is not a vulnerable software? [ ]
(a) Virus (b) worm
( c ) winrar (d) trojan horse
6.Bot is short form of [ ]
(a) Battery (b) boot
( c ) best of technology (d) robot
7.Firewalls are to protect against [ ]
(a) Virus attack (b) unauthorized attacks
( c ) data driven attacks (d) fire attacks
8. In which of the following,a person is constantly followed/ chased by another person .
or group of several peoples? [ ] (a) Phishing (b) stalking
( c ) bulling (d) identity theft
9.Which of the following is considered as the unsolicited commercial email? . [ ] (a) Spam (b) virus
( c ) malware (d) worm
10.In which of the following refers to exploring the appropriate, ethical behaviours related to the online
environment and digital media platform? [ ] (a) Cyber law (b) cyber security
( c ) cyberethics (d) cyber safety
.Which of the following provides security at transport layer [ ] a. SSL b. TLS c.SSH
d.Both A & B
12.One security protocol for the E-Mail system is [ ] a.IPSec b. SSL c.PGP d.None of the
above
13. URL stands for – [ ] a) Universal Remote Locator
b) Universal Resource Language
c) Uniform Resource Locator
d) Uniform Resource Language
14.Number of phases in the handshaking protocol? [ ] a) 2 b) 3 c) 4 d) 5
15. S/MIME is abbreviated as __________________ [ ] a) Secure/Multimedia Internet
Mailing Extensions
b) Secure/Multipurpose Internet Mailing Extensions
c) Secure/Multimedia Internet Mail Extensions
d) Secure/Multipurpose Internet Mail Extensions
Ans. Cyber security can be broke down into two categories: cyber and security. The term cyber refers to a
wide range of technology, including systems, network, program and data. Security on the other hand is
concerned with the safeguarding of system, network, applications and data: - cyber security is the process
of safeguarding internet connected system such as computer, servers, mobile devices, electronic systems,
and network and data form malicious attacks
2. What is mobile malware?
Ans: - Mobile malware: it is malicious software that is designed to specifically target mobile operating
systems and disrupt their functionality. The most common cause is the insecure use of URLs over WIFI or
other internet network
3. What is a security policy?
Ans : - security policies are a formal set of rules which is issued by an organization to ensure that the user
who are authorized to access company technology and information assets comply with rules and
guidelines related to the security of information
Key
MCQ's Answers:
1.c
2. a
3. c
4. d
5. d
6. d
7. b
8. b
9. a
10.c
11. d
12. c
13. c
14. c
15. d
Fill in the Blanks Answers:
1. Cyber terrorism
2. Firewall
3. Trojans
4. Virus
5. Worm
6. Encrypt
7. Antivirus
8. Backdoors
9. Spyware
10. Authenitication
11. TLS and SSL
12. PGP
13. Hyper Text Transfer Protocol Secure
14. IPsec
15. Hardware Firewall
UNIT: 2
12. is a process with which we can allow or restrict resources of a web services . [ ] (a)
Authentication
(b) Authorization
(c) Mandatory access control
(d) None of the above
13) _______ is a type of software designed to help the user's computer detect viruses and avoid them.
5. RBAC
ANS :- RBAC stands for role based access control . it is an authorization mechanism that associates a set
of access privileges with a particular role often corresponding to a jab function . with RBAC all user
access is mediated through role rbac simplifies security management by providing a role hierarchy
structure
MCQ’s
1.a
2. a
3. d
4.b
5.a
6.c
7.d
8.d
9.c
10. d
11. a
12.d
13.c
14. b
15.d
UNIT-3
Multiple Choice Questions:
1. What are the major components of the intrusion detection system? [ ] [a] Analysis
Engine [b] Event provider
[c] Alert Database [d] All of the mentioned
2. What are the different ways to classify an IDS? [ ] [a] Zone-ased [b] Host and Network-
based
[c] Network and Zone-based [d] Level-based
3.What are the characteristics of anomaly-based IDS? [ ] [a] It models the normal usage of
network as a noise characterization
[b] It doesn’t detect novel attacks
[c] Anything distinct from the noise is not assumed to be intrusion
activity [d] It detects base on signature
4. What is the major drawback of anomaly detection IDS? [ ] [a] These are very slow at
detection
[b] It generates many false alarms
[c] It doesn’t detect novel attacks
[d] None of the mentioned
5. What are the characteristics of signature-based IDS? [ ] [a] Most are based on simple
pattern matching algorithms
[b] It is programmed to interpret a certain series of packets
[c] It models the normal usage of network as a noise characterization
[d] Anythning distinct from the noise is assumed to be intrusion activity
6. What are the characteristics of Host-based IDS? [ ] [a] The host operating system logs in
the audit information
[b] Lo3gs includes logins, file opens and program executions
[c] Logs are analysed to detect tails of intrusion
[d] All of the mentioned
7. What are the drawbacks of host-based IDS? [ ] [a] Unselective logging of
messages may increase the audit burdens
[b] Selective logging runs the risk of missed attacks
[c] They are very fast to detect
[d] They have to be programmed for new patterns
8. What are characteristics of Network based IDS? [ ] [a] They look for attack signatures
in network traffic
[b] Filter decides which traffic will not be discared or passed
[c] It is programmed to interpret a certain series of packet
[d] It models the normal usage of network as a noise characterisation
9. Where is an IPS commonly placed in a network? [ ] [a] In front of the firewall
[b] In line with the firewall
[c] Behind the firewall
[d] On the end users’ device
10. If it detects a threat, an IPS can: [ ] [a] Record the details of the threat
[b] Report the threat to security admins
[c] Take preventative action to stop the threat
[d] All of the above
11. Which of the following is not an advantage of cyber security?
a) Makes the system slower
b) Minimizes computer freezing and crashes
c) Gives privacy to users
d) Protects system against viruses
View Answer
13. In which year has hacking become a practical crime and a matter of concern in the field of cyber
technology?[ ]
a) 1991
b) 1983
c) 1970
d) 1964
View Answer
14. Governments hired some highly skilled hackers for providing cyber security for the country or state.
These types of hackers are termed as _______[ ]
a) Nation / State sponsored hackers
b) CIA triad
c) Special Hackers
d) Government Hackers
View Answer
1. PHYSICAL THEFT
Ans :- cyber security begins with strong physical security lapses I physical security can expose
sensitive company data to identity theft, with potentially serious consequences
2. MALWARE INFECTION
Ans :- malware or malicious is an umbrella term that describes any malicious program or code that is
harmful to computer system. Hostile, intrusive, and intentionally nasty , malware seeks to invade ,
damage , or disable computers , computer systems , networks, tablets , and mobile devices , often by
taking partial control over a device’s operations.
3. ARTIFICIAL INTELLIGENCE
Ans :- it is the branch of computer technology that develops intelligent machines, which include
reasoning logical manipulation , probability and many other there are various methodologies under
artificial intelligence that are used to implement IDS
4. SOFTWARE APPROACH
Ans :- this approach is used to implement IDS with state transition analysis . here intrusion undergoes
different states there are two states in which number of transaction take place; these states correspond to
the state before attack is done on system and the other state is known as compromised state that
corresponds to the state after the system is attacked
5. VIRUSES
Ans :- a computer virus is a malicious application or authored code used to perform destructive activity on
a device or local network. The code’s malicious activity could damage the local file system, steal data,
interrupt services, download additional malware or any other actions coded into the programs to trick users
into executing them on their device, delivering the computer virus payload MCQ’s
1. d
2. b
3. a
4. b
5. a
6. d
7. c
8. a
9. b
10. d
11. a
12. b
13. c
14. a
15. b
5. Which of the following statements is true about the VPN in Network security? [ ] (a)
It is a type of device that helps to ensure that communication between a device and a
network is secure.
(b) It is usually based on the IPsec (IP Security) or SSL (Secure Sockets Layer)
(c) It typically creates a secure, encrypted virtual "tunnel" over the open
internet (d) All of the above
6. If the same pair of keys are used for encryption and decryption, it is called . . [ ] (a)
Asymmetric cryptography
(b) Symmetric cryptography
(c) Public cryptography
(d) None of these
7. VPN is abbreviated as
(a) Visual Private Network
(b) Virtual Protocol Network
(c) Virtual Private Network
(d) Virtual Protocol Networking
8. A can hide a user's browsing activity. [ ] (a) Firewall
(b) Antivirus
(c) Browser
9. VPN are also used for hides user's physical location. [ ] (a) Firewall
(b) Antivirus
(c) VPN
(d) Incognito mode
10. What are the protocols used for creating VPNs? [ ] (a) Layer 2 Tunneling Protocol
(L2TP)
(b) Secure Socket Tunneling Protocol (SSTP)
(c) Point-to-Point Tunneling Protocol (PPTP)
(d) All the above
11. Packet filtering firewalls are deployed on ___ [ ] (a) Routers
(b) Switches
(c) Hubs
(d) Repeaters
12. ACL stands for [ ] (a) Access Condition List
(b) Anti-Control List
(c) Access Control Logs
13. Access Control List The approved general-purpose MAC algorithm is are [ ] (a)
HMAC
(b) KMAC
(c) CMAC
(d) All the above
14. is a popular program used to encrypt and decrypt email over the Internet [ ] (a)
SMTP
i. (b)FTP
ii. (c)PGP
iii. (d)None of these
1. What is cryptography?
Ans :- cryptography is a method of storing and transmitting data in a particular form so that only those for
whom it is intended can read and process it . crypt means hidden and graphy stands for writing .
cryptography can reformat andtransform the data , making it safer on its tri[ between computers 2. What
is DES ?
Ans :- DES stands for data encryption standard . it is a symmetric-key method of data encryption. DES
works by using the same key to encrypt and decrypt a message , so both the sender and the receiver must
know and use the same private key .
Ans :- message authentication is a technique used to ensure that the message has been sent by a genuine
identity and not by an impersonatora message authentication code is a tag, or a hash value attached to
message to ensure the integrity and authenticity if the message the tag or hash value attached to message
4. Digital signatures
Ans :- a digital signature is basically a way to ensure the authenticity and integrity of an electronic
document the document can be an e-mail , spreadsheet , pdf or text file .
5. FIREWALL
Ans :- a firewall is a network security system that monitors incoming and outgoing network trffic
and decides whether to allow or block specific traffic based on a defined set of security rules. A
firewall is a system that enforces an access control policy between two networks such as a private
LAN and the unsafe , public internet
MCQ’s
1. a
2. b
3. b
4. a
5. a
6. b
7. c
8. d
9. c
10. d
11. a
12. d
13. d
14. c
15. a
1. A policy, which demand that certain kinds of data must be stored in servers located
physically within India, termed as ___________________
2.______________is referred to as the Law of the internet.
3. ___________is the ISO standard containing the specification for security
management systems for the supply chain
4. ______________is the ISO standard containing guidelines for the identification,
collection, acquisition, and preservation of digital evidence.
5. The process of gathering and documenting proof from a computer or a computing device
by applying the techniques of investigation and analysis is called ______________ 6.
Collecting, preserving, Analysing, and presenting digital artifacts are the primary goals of
______________
7. The____________ file system for Microsoft’s Windows 7 which is used to manage files
present on disk.
8. ___________________is a technical standard and email authentication technique that
helps protect email sender and recipients from spam , spoofing and phishing.
9. _____________provides an encryption key and digital signature that verifies that an
email message was not faked or altered.
10.An ________________is a unique address that identifies a device on the internet or a
local network.
11.IP address pf IPv6 are__________ long.
12.______________are small text files placed on a user’s computer, which are
commonly used to collect personal data.
13.A __________ is a hidden, transparent graphic image that is used to read user
behaviour on user’s computer.
14._____ refers to the analysis of volatile data in a computer’s memory dump.
15.A snapshot capture of computer memory data from a specific instant is called a
_____________
1.Cyber space
Ans :- the term cyberspace refers to the virtual computer world and more specifically an electronic medium
that is used to facilitate online communication . cyberspace typically involves a large computer network
made up of many worldwide computer subnetworks that employ TCP/IP protocol to aid in communication
and data exchange activities
2. Cyber law
Ans :- Cyber law is referred to as the law of the internet . The cyber law definition says it is a legal system
designed to deal with the internet , computing , cyberspace, and related legal issues
3. E-MAIL header
Ans : - The e-mail header is a code snippet in an HTML e-mail that contains information about the sender,
recipient , e-mail’s route to get the in box and various authentication details . the email header always
precedes the email body or text
4 Cookies
Ans :- cookies are small text files placed on a user’s computer which are commonly used to collect
personal data . Most website operators place cookies on the browser or hard drive we of their user’s
computer. Cookies can gather information about the use of a website or enable the website to recognize the
user as an existing customer when they return to the website next time.
MCQ’s
1. a
2. b
3. c
4. c
5. d
6. d
7. c
8. a
9. b
10. b
11. d
12. d
Fill in the blanks
1. Data localization
2. Cyber law
3. ISO 28000
4. ISO/IEC 27037
5. Cyber Foreniscs.
6. Cyber investigation
7. NTFS file system
8. Sender policy framework,SPF
9. DKIM
10. IP address
11. 128 bit
12. Cookies
13. Web beacon
14. Memory tracing
15. Memory dump