Vulnerability Assessment
Description: Vulnerability assessment test contains IT questions for practice and exam preparation | |
Number of Questions: 15 | |
Created by: Mohini Tyagi | |
Tags: Vulnerability assessment IT questions Vulnerability assessment practice test Network Security and Firewall |
In which of the following security techniques does the user define a policy permitted download of code from the corporate segment but not from other sites?
Which of the following security techniques does not follow the concept of state from one packet to the next?
Which of the following types of malicious codes triggers action when condition occurs?
Which of the following security mechanisms consists of the services provided such as key exchange algorithms, hash algorithms, compression algorithms, etc.?
Which of the following types of threats is in the nature of eavesdropping on, or monitoring of transmissions?
Which of the following security mechanisms encompasses the dealings between the credit card holders, public key certificate authorities, vendors, etc.?
Which of the following security standards performs the actions such as generate a message digest, transmit the message to the recipient, etc.?
Which of the following security standards secures all sorts of attachments such as spread sheets, presentations, sounds, etc.?
Which of the following types of threats involves some modification of the data stream or the creation of a false stream?
Which of the following types of malicious codes triggers action when specified date occurs?
Which of the following security techniques also called bastion host intrudes in the middle of the protocol exchange seeming like a destination in communication with the sender that is outside the firewall?
Which of the following types of threats occurs when an unauthorised party has gained access?
Which of the following types of malicious codes allows unauthorised access to functionality?
Which of the following types of malicious codes contains unexpected and has additional functionalities?
Which of the following security techniques allows text mode and simple graphics but disallows complex graphics, music, etc.?