Which of the following security attack affects or exhibits threats to the integrity of any message?
(a) Interruption
(b) Modification
(c) Interception
(d) Fabrication
Spoofing is an example of: [Select all correct options]
(a) Deception
(b) Disclosure
(c) Usurpation
(d) Disruption
Which of the following is/are NOT a type of an active attack?
(a) Denial of service
(b) Traffic analysis
(c) Replay
(d) Masquerade
Typical goal(s) of a security mechanism is/are:
(a)Prevention
(b)Counter Attack
(c)Detection
(d)Trust
Considering the multi-tenancy property of cloud, new risks involve:
(a)Side-channels exploitation
(b)Vulnerable VM isolation mechanisms
(c)Lack of control in shared server space
(d)Denial of Service (DOS)
Which of the following is/are Gartner’s cloud computing security risks?
(a) Data Location
(b) Long-term Viability
(c) Privileged User Access
(d) Operating System Vulnerability
In cloud “Recovery Time Objective” ( RTO) depicts:
(a)The period of time allowed for recovery
(b)Percentage of data recovered
(c )Maximum amount of data recovered
(d)None
Which type(s) of firewall record(s) information about ongoing TCP sessions and ensures out-of-session packets are discarded?
(a) Stateful
(b) Application proxy
(c) Packet filter
(d) None of these
Which of the following sequence is correct for working of network security?
(a) Reconnaissance, Determine security policy, Determine security policy, Post-attack investigation
(b) Determine security policy, Vulnerability scanning, Post-attack investigation, Reconnaissance
(c) Vulnerability scanning, Determine security policy, Reconnaissance, Post-attack investigation
(d) Determine security policy, Reconnaissance, Vulnerability scanning, Post-attack investigation
Basic component(s) of cloud security is/are:
(a)Integrity
(b)Availability
(c)Confidentiality
(d)Access Control
wajahatkincsem:
please ask each question separately as these type of questions confuse readers.
Answers
Answered by
0
The correct answers have been given below -
Answer 1 - Option b - Modification.
Answer 2 - Option b - Disclosure. I think the term is 'Snooping'.
Answer 3 - Option b - Traffic analysis.
Answer 4 - Option a - Prevention. Like the Intrusion Prevention Systems (IPS). It could also be option c - Detection.
Answer 5 - Maybe the Option c - Lack of control in shared server space.
Answer 6 - Option c - Privileged User Access.
Answer 7 - Option a - The period of time allowed for recovery.
Answer 8 - Maybe Option a - Stateful.
Answer 9 - Option a - Reconnaissance, Determine security policy, Determine security policy, Post-attack investigation. But the 2nd and 3rd choice are the same. One of it should be Vulnerability scanning.
Answer 10 - Option d - Access Control.
Answer 1 - Option b - Modification.
Answer 2 - Option b - Disclosure. I think the term is 'Snooping'.
Answer 3 - Option b - Traffic analysis.
Answer 4 - Option a - Prevention. Like the Intrusion Prevention Systems (IPS). It could also be option c - Detection.
Answer 5 - Maybe the Option c - Lack of control in shared server space.
Answer 6 - Option c - Privileged User Access.
Answer 7 - Option a - The period of time allowed for recovery.
Answer 8 - Maybe Option a - Stateful.
Answer 9 - Option a - Reconnaissance, Determine security policy, Determine security policy, Post-attack investigation. But the 2nd and 3rd choice are the same. One of it should be Vulnerability scanning.
Answer 10 - Option d - Access Control.
Similar questions