×
☰ Menu

MCQ Questions of Computer System Security KNC 301/401

 

1. __________ is the cyclic practice for identifying & classifying and then solving the vulnerabilities in a system.
a. Bug protection
b. Vulnerability management
c. Vulnerability measurement
d. Bug bounty


Answer: (b)


2. ____________ is a special type of vulnerability that doesn’t possess risk.
a. Vulnerabilities without risk
b. Vulnerabilities no one knows 
c. Vulnerabilities without attacker
d. Vulnerabilities without action


Answer: (a)


3. ________ is a piece of software or a segment of command that usually take advantage of a bug to cause unintended actions and behaviors.
a. Malware
b. Trojan
c. Worms
d. Exploit


Answer: (d)


4. A method that uses two independent pieces/processes of information to identify a user is known as…
a. Authentication through encryption
b. Password-method authentication
c. Two-method authentication
d. Two-factor authentication


Answer: d


5. Where the security enforcement is needed firstly…
a. Scripting
b. Application
c. Assigning Roles
d. Administration


Answer: b


6. According to the CIA Triad, which of the below-mentioned element is not considered in the triad?
a. Authenticity
b. Confidentiality
c. Integrity
d. Availability


Answer: a


7. CIA triad is also known as ________
a. NIC (Non-repudiation, Integrity, Confidentiality)
b. AIC (Availability, Integrity, Confidentiality)
c. AIN (Availability, Integrity, Nonrepudiation)
d. AIC (Authenticity, Integrity, Confidentiality)


Answer: b


8. _______ of information means, only authorized users are capable of accessing the information.
a. Availability
b. Confidentiality
c. Integrity
d. Non-repudiation

Answer: b


9. A ______ may at any time be idle, or have one or more _______ executing on its behalf.
a. subject, principals
b. principal, subjects
c. subject, objects
d. principal, objects


Answer(b)


10. Which of the following is correct with respect to objects?
a. An object is anything on which a subject can perform operations (mediated by rights)
b. Objects are usually passive 
c. Both A and B
d. Only A


Answer(c)


 

You can buy more than 400 MCQ-type questions of Computer System Security  KNC-301/ KNC-401 only in ShreeSanavi Academy, and you can get the Previous year's AKTU Question paper free.

 

For Buy and Download Click here

 


 

computer system security notes prutor

computer system security notes aktu

computer system security aktu syllabus

computer system security aktu question paper

computer system security notes pdf

knc301 aktu syllabus

prutor css

prutor css quiz

prutor css quiz 5 answers

prutor css quiz 10 answers

prutor css quiz date

css aktu syllabus