0

Vulnerability Assessment

Description: Vulnerability assessment test contains IT questions for practice and exam preparation
Number of Questions: 15
Created by:
Tags: Vulnerability assessment IT questions Vulnerability assessment practice test Network Security and Firewall
Attempted 0/15 Correct 0 Score 0

In which of the following security techniques does the user define a policy permitted download of code from the corporate segment but not from other sites?

  1. Transport layer security

  2. Proc-type

  3. Message integrity check

  4. Packet filtering gateway

  5. Personal firewall


Correct Option: E
Explanation:

In this security technique, the user defines a policy permitting download of code from the corporate segment but not from other sites.

Which of the following security techniques does not follow the concept of state from one packet to the next?

  1. Non repudiation

  2. Transport layer security

  3. Stateful inspection firewall

  4. Packet filtering gateway

  5. Message authentication code


Correct Option: C
Explanation:

This security technique does not follow the concept of state from one packet to the next.

Which of the following types of malicious codes triggers action when condition occurs?

  1. Logic bomb

  2. Virus

  3. Worm

  4. Threat

  5. Message integrity


Correct Option: A
Explanation:

This type of malicious code triggers action when condition occurs.

Which of the following security mechanisms consists of the services provided such as key exchange algorithms, hash algorithms, compression algorithms, etc.?

  1. Packet filtering gateway

  2. Message confidentiality

  3. Certificate scheme

  4. Secure socket layer

  5. Transport layer security


Correct Option: D
Explanation:

This security mechanism consists of the services provided such as key exchange algorithms, hash algorithms, compression algorithms, etc.

Which of the following types of threats is in the nature of eavesdropping on, or monitoring of transmissions?

  1. DEK-Info

  2. Passive attack

  3. Interruption

  4. Vulnerability

  5. Virus


Correct Option: B
Explanation:

This type of threat is in the nature of eavesdropping on, or monitoring of transmissions.

Which of the following security mechanisms encompasses the dealings between the credit card holders, public key certificate authorities, vendors, etc.?

  1. Key Info

  2. Packet filtering gateway

  3. Secure electronic transaction

  4. Transport layer security

  5. Message authentication code


Correct Option: C
Explanation:

It encompasses the dealings between the credit card holders, public key certificate authorities, vendors, etc.

Which of the following security standards performs the actions such as generate a message digest, transmit the message to the recipient, etc.?

  1. Pretty good privacy

  2. Message integrity check

  3. Certificate scheme

  4. Transport layer security

  5. Sender authenticity


Correct Option: A
Explanation:

This security standard performs the actions such as generate the message digest, transmit the message to the recipient, etc.

Which of the following security standards secures all sorts of attachments such as spread sheets, presentations, sounds, etc.?

  1. Proc-Type

  2. Packet filtering gateway

  3. Secure multipurpose internet mail extension

  4. Message integrity check

  5. Certificate scheme


Correct Option: C
Explanation:

This security standard secures all sorts of attachments such as spreadsheets, presentations, sounds, etc.

Which of the following types of threats involves some modification of the data stream or the creation of a false stream?

  1. Sender authenticity

  2. Active attack

  3. Interruption

  4. Vulnerability

  5. Worm


Correct Option: B
Explanation:

This type of threat involves some modification of the data stream or the creation of a false stream.

Which of the following types of malicious codes triggers action when specified date occurs?

  1. Message confidentiality

  2. Threat

  3. Virus

  4. Worm

  5. Time bomb


Correct Option: E
Explanation:

This type of malicious code triggers action when specified date occurs.

Which of the following security techniques also called bastion host intrudes in the middle of the protocol exchange seeming like a destination in communication with the sender that is outside the firewall?

  1. Application proxy gateway

  2. Packet filtering gateway

  3. Non repudiation

  4. Message integrity check

  5. Transport layer security


Correct Option: A
Explanation:

This security technique also called bastion host intrudes in the middle of the protocol exchange seeming like a destination in communication with the sender that is outside the firewall.

Which of the following types of threats occurs when an unauthorised party has gained access?

  1. Worm

  2. Interception

  3. Interruption

  4. Vulnerability

  5. Non repudiation


Correct Option: B
Explanation:

This type of threat occurs when an unauthorised party has gained access.

Which of the following types of malicious codes allows unauthorised access to functionality?

  1. Message integrity

  2. Trapdoor

  3. Worm

  4. Virus

  5. Threat


Correct Option: B
Explanation:

This type of malicious code allows unauthorised access to functionality.

Which of the following types of malicious codes contains unexpected and has additional functionalities?

  1. Sender authenticity

  2. Vulnerability

  3. Trojan horse

  4. Virus

  5. Worm


Correct Option: C
Explanation:

This type of malicious code is unexpected and has additional functionalities.

Which of the following security techniques allows text mode and simple graphics but disallows complex graphics, music, etc.?

  1. Guard

  2. Packet filtering gateway

  3. Non-repudiation

  4. Message integrity check

  5. Transport layer security


Correct Option: A
Explanation:

This security technique allows text mode and simple graphics but disallows complex graphics, music, etc.

- Hide questions