Posts

Showing posts from September, 2022

AKTU : 10 Computer System Security Quiz answer

Image
  AKTU : 10 Computer System Security  Quiz answer Question:1- Which of the following statement is true for RSA algorithm ? Security of RSA depends on problem of factoring large number In software, RSA is 10 times slower than DES In hardware, RSA is 100 times slower than DES RSA can be faster than the symmetric algorithm Question:2-  In cryptography The receiver can verify signature using public key cryptographic hash function is used in creating digital fingerprint Both 1 and 2 None of the above Question:3-  Which of the following statements is/are true (For cryptography) ? SET and IP Sec are cryptography protocols. Receiver decrypts the message using their private key. Sender gets receiver's public key from databse. All of the above . Question: 4- Select the correct statement for OSI model. IP Sec protocol is in network layer of OSI model. Physical layer transmits and receives unstructured raw data. HTTP is application level protocol. All of the above . Question:5-...

AKTU : 9 Computer System Security Quiz answer

Image
  AKTU : 9 Computer System Security  Quiz answer QUESTION:1- Which of the following is correct for CSRF attack ? It tricks user to send malicious request to server. Cookie can be used in CSRF attack Both 1 and 2 None of the mentioned above QUESTION:2-   One of the ways to prevent CSRF attack is that you should use _____ validation. Referrer CSRF token browser Both 1 and 2 QUESTION:3-  Some of the vulnerability of a websites is/are ? SQL Injection CSRF Cross Side Scripting All of the above QUESTION:4- ________ is a attack in which the script is stored permanently on server. Stored XSS Reflected XSS DOM based attack All of the above QUESTION:5-   Which of the following is true for DOM-based XSS attack ? Set the Http Only flag in cookies Ensure that session IDs are not exposed in a URL payload can not be found in response None of the above

AKTU : 8 Computer System Security Quiz answer

Image
  AKTU : 8 Computer System Security  Quiz answer QUESTION:1-  Password should be combination of ____. (according to the video lecture). Lower case letters only Memorable names and dates Upper case and lower-case letters, numbers and non letter characters Upper case and lower-case letters, numbers and symbols QUESTION:2-  The cookies we use, are sent with ______, which in general, _____ the performance. only when requested,improves every request, degrades extra information, is useless for None of the mentioned QUESTION:3-   Which of the following header is used to create cookie ? Create-Cookie Init-Cookie Set-Cookie Start-Cookie QUESTION:4-   _______ is an attack to inject code, in which malicious SQL code is passed to an instance of SQL Server from ______. SQL injection, user input field code injection, another server both 1 and 2 None of the above. QUESTION:5- How to prevent SQL injection ? Use parameterized / prepared SQL use string concatenated...

AKTU : 7 Computer System Security Quiz answer

Image
  AKTU : 7 Computer System Security  Quiz answer Question: 1- ____ is a type of permission in an unix file which can be assigned to a ______. execute, administrator read, group write, user All of the above   Question: 2- Which of the following statement is correct for access token ? It contains the destination for access token. It contains a list of the privileges held by either the user or the user's groups. Impersonation Token is a personal token . All of the above Question :3 - Making a user click on something, disguised as something else, is known as ? Clickjacking Brute force attack Eavesdropping Waterhole Question :4 - ____ is a process to break into password protected system. Dictionary attack Brute force attack Rainbow Table Attack All of the above Question :5- For chromium browser, which of the following statement is false ? It has a rendering engine and browser kernel. Browser kernel is used to parse html. It uses v8 java script engine. All of the above

AKTU : 6 Computer System Security Quiz answer

Image
  AKTU : 6 Computer System Security  Quiz answer Q:(1).. One of the name of backdoor virus is _____ . once access is enabled, it may hide ______. (a)..Stealth, files (b)..Rootkit,traces of unauthorised access (c)..Hidden Key, unauthorised access (d)..Worm, unauthorised access Answer:- (b) ..Rootkit,traces of unauthorised access Q:(2).. A Password cracker is a attack tool. Which of the following is also a type of attack tool ? (a)..Rootkit Revealer (b)..Network sniffer (c).. TDSS- Killers (d)..All of the above Answer:- (b) ..Network sniffer Q:(3).. knirk hides or unhide files or directories. It ? (a)..uses system call redirection to hide its presence. (b)..hides TCP or UDP connections. (c)..is a loadable kernel module. (d)..All of the above Answer:- (d) ..All of the above Q:(4).. Which of following is true for signature-based IDS? (a)..They can essily detect known attacks. (b)..They can detect new attacks for which no pattern is there. (c)..They have high false positi...