CS
CS
4. What technology is commonly used to protect network perimeters and control access
between internal and external networks?
A) Antivirus software
B) Intrusion Detection Systems (IDS)
C) Firewalls
D) Virtual Private Networks (VPNs)
6. What type of security technology is used to monitor network traffic and identify
suspicious behavior or patterns?
A) Firewalls
B) VPNs
C) Intrusion Detection Systems (IDS)
D) Access Control Lists (ACLs)
11. Which security measure is commonly used to protect sensitive information during
online transactions?
A) SSL encryption
B) Public key infrastructure (PKI)
C) Digital signatures
D) Virtual private networks (VPNs)
12. What is a potential security threat associated with archival storage of data?
A) Loss of data due to hardware failure
B) Unauthorized access to historical records
C) Data corruption during transmission
D) Lack of storage capacity
13. How can access control mechanisms help mitigate security threats in data storage?
A) By encrypting data at rest
B) By restricting access based on user roles
C) By providing physical barriers to storage devices
D) By automatically deleting old data
14. What technology can help prevent unauthorized access to archived data?
A) Intrusion Detection Systems (IDS)
B) Access Control Lists (ACLs)
C) Virtual Private Networks (VPNs)
D) Secure Sockets Layer (SSL)
15. How does data encryption contribute to data security in archival storage?
A) By preventing unauthorized access to data in transit
B) By ensuring data integrity during storage
C) By protecting data from physical theft
D) By making data unreadable without proper decryption keys
Label the process of setting up of fake access points in high-traffic public locations.
a)Unsecured Wi-Fi b)Phishing Attacks
b)Network Spoofing c)Spyware
Quote the cryptographic type used by Digital Signatures for validating the authenticity and
integrity of a message
a) Private key
b) Public key
c) Digital key
d) Digital Certificates
Fill the right options:
Management console, attack signatures, Sensors, malicious packet, match
An IDS comprises ___________and sensors
It has a database of ________
_________detect any malicious activity
It also matches the ___________against the database
If found a _____, the sensor reports the malicious activity to the management console
UNIT 3
1. Which of the following is a key consideration in developing secure information systems?
A) Maximizing system performance
B) Minimizing user convenience
C) Incorporating robust security measures
D) Ignoring potential security vulnerabilities
5. What security issue is associated with hardware, data storage, and downloadable
devices?
A) Data encryption
B) Physical tampering
C) User authentication
D) Software patch management
8. What technology is commonly used for monitoring and recording activities within a
physical environment?
A) Intrusion Detection Systems (IDS)
B) Virtual Private Networks (VPNs)
C) Closed-circuit television (CCTV)
D) Secure Sockets Layer (SSL)
11. Which phase of the software development lifecycle is most critical for addressing security
issues?
A) Planning and Requirements Analysis
B) Design and Architecture
C) Implementation and Coding
D) Testing and Quality Assurance
15. What is a common security measure for protecting data stored on physical devices?
A) Intrusion Detection Systems (IDS)
B) Encryption
C) CCTV surveillance
D) Access Control Lists (ACLs)
Characterize the type of hackers who use their knowledge for good purposes.
a) Black hat b)White hat
c) Gray hat d)Blue hat
Intrusion Detection System, NIDS and HIDS, Software Development Life Cycle,
Responding to the risks, CCTV
To take preventive or corrective measures so that systems can be kept protected from any
kind of threats, whether internal or external is ________
__________ is used for physical security of an organization.
2. IDS can be broadly classified as **NIDS (Network Intrusion Detection System)** and
**HIDS (Host Intrusion Detection System)**.
4. To take preventive or corrective measures so that systems can be kept protected from any
kind of threats, whether internal or external is **Responding to the risks**.
If you have any further questions or need clarification, feel free to ask!