Computer Science, asked by punithaneetchan, 1 year ago

Which of the following security attack affects or exhibits threats to the integrity of any message?
(a) Interruption
(b) Modification
(c) Interception
(d) Fabrication

Spoofing is an example of: [Select all correct options]
(a) Deception
(b) Disclosure
(c) Usurpation
(d) Disruption

Which of the following is/are NOT a type of an active attack?
(a) Denial of service
(b) Traffic analysis
(c) Replay
(d) Masquerade

Typical goal(s) of a security mechanism is/are:
(a)Prevention
(b)Counter Attack
(c)Detection
(d)Trust

Considering the multi-tenancy property of cloud, new risks involve:
(a)Side-channels exploitation
(b)Vulnerable VM isolation mechanisms
(c)Lack of control in shared server space
(d)Denial of Service (DOS)

Which of the following is/are Gartner’s cloud computing security risks?
(a) Data Location
(b) Long-term Viability
(c) Privileged User Access
(d) Operating System Vulnerability

In cloud “Recovery Time Objective” ( RTO) depicts:
(a)The period of time allowed for recovery
(b)Percentage of data recovered
(c )Maximum amount of data recovered
(d)None

Which type(s) of firewall record(s) information about ongoing TCP sessions and ensures out-of-session packets are discarded?
(a) Stateful
(b) Application proxy
(c) Packet filter
(d) None of these

Which of the following sequence is correct for working of network security?
(a) Reconnaissance, Determine security policy, Determine security policy, Post-attack investigation
(b) Determine security policy, Vulnerability scanning, Post-attack investigation, Reconnaissance
(c) Vulnerability scanning, Determine security policy, Reconnaissance, Post-attack investigation
(d) Determine security policy, Reconnaissance, Vulnerability scanning, Post-attack investigation

Basic component(s) of cloud security is/are:
(a)Integrity
(b)Availability
(c)Confidentiality
(d)Access Control


wajahatkincsem: please ask each question separately as these type of questions confuse readers.

Answers

Answered by writersparadise
0
The correct answers have been given below - 

Answer 1 - Option b - Modification.

Answer 2 - Option b - Disclosure. I think the term is 'Snooping'.

Answer 3 - Option b - Traffic analysis.

Answer 4 - Option a - Prevention. Like the 
Intrusion Prevention Systems (IPS). It could also be option c - Detection.

Answer 5 - Maybe the Option c - 
Lack of control in shared server space.

Answer 6 - Option 
c - Privileged User Access.

Answer 7 - Option a - 
The period of time allowed for recovery.

Answer 8 - Maybe Option a - 
Stateful.

Answer 9 - Option a - 
Reconnaissance, Determine security policy, Determine security policy, Post-attack investigation. But the 2nd and 3rd choice are the same. One of it should be Vulnerability scanning.

Answer 10 - Option d - 
Access Control.
Similar questions