InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Possible threat to any information cannot be ________________(a) reduced(b) transferred(c) protected(d) ignoredThe question was posed to me in exam.Question is from Information Security Technologies topic in section Cyber Security of Cyber Security |
|
Answer» The correct choice is (d) ignored |
|
| 2. |
Compromising confidential information comes under _________(a) Bug(b) Threat(c) Vulnerability(d) AttackI got this question in a national level competition.My enquiry is from Information Security Technologies in portion Cyber Security of Cyber Security |
|
Answer» The correct option is (b) Threat |
|
| 3. |
Lack of access control policy is a _____________(a) Bug(b) Threat(c) Vulnerability(d) AttackI have been asked this question by my college director while I was bunking the class.The doubt is from Information Security Technologies topic in portion Cyber Security of Cyber Security |
|
Answer» The correct CHOICE is (C) Vulnerability |
|
| 4. |
_______ technology is used for analyzing and monitoring traffic in network and information flow.(a) Cloud access security brokers (CASBs)(b) Managed detection and response (MDR)(c) Network Security Firewall(d) Network traffic analysis (NTA)I have been asked this question in final exam.I'd like to ask this question from Information Security Technologies in division Cyber Security of Cyber Security |
|
Answer» The correct option is (d) Network TRAFFIC analysis (NTA) |
|
| 5. |
The full form of EDR is _______(a) Endpoint Detection and recovery(b) Early detection and response(c) Endpoint Detection and response(d) Endless Detection and RecoveryThe question was asked in semester exam.The above asked question is from Information Security Technologies in division Cyber Security of Cyber Security |
|
Answer» Correct option is (c) Endpoint Detection and response |
|
| 6. |
Which of the following information security technology is used for avoiding browser-based hacking?(a) Anti-malware in browsers(b) Remote browser access(c) Adware remover in browsers(d) Incognito mode in a browserThis question was addressed to me at a job interview.I'd like to ask this question from Information Security Technologies in section Cyber Security of Cyber Security |
|
Answer» Right option is (b) REMOTE browser access |
|
| 7. |
_____ platforms are used for safety and protection of information in the cloud.(a) Cloud workload protection platforms(b) Cloud security protocols(c) AWS(d) One DriveI have been asked this question during an interview.This question is from Information Security Technologies in portion Cyber Security of Cyber Security |
|
Answer» RIGHT option is (a) Cloud WORKLOAD protection platforms The best I can explain: Nowadays data centres support workloads from different geographic locations across the globe through PHYSICAL systems, virtual machines, servers, and clouds. Their security can be MANAGED using Cloud workload protection platforms which MANAGE policies regarding security of information irrespective of its location. |
|
| 8. |
From the options below, which of them is not a vulnerability to information security?(a) flood(b) without deleting data, disposal of storage media(c) unchanged default password(d) latest patches and updates not doneThe question was asked during an internship interview.This question is from Information Security Technologies in division Cyber Security of Cyber Security |
|
Answer» Correct choice is (a) FLOOD |
|
| 9. |
From the options below, which of them is not a threat to information security?(a) Disaster(b) Eavesdropping(c) Information leakage(d) Unchanged default passwordThe question was posed to me during an internship interview.Enquiry is from Information Security Technologies in division Cyber Security of Cyber Security |
|
Answer» RIGHT option is (d) UNCHANGED default password For explanation: DISASTER, eavesdropping and information leakage come under information security threats whereas not changing the default password of any system, hardware or any software comes under the CATEGORY of vulnerabilities that the USER may pose to its system. |
|
| 10. |
_______ is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.(a) Network Security(b) Database Security(c) Information Security(d) Physical SecurityI had been asked this question in unit test.Asked question is from Information Security Technologies topic in chapter Cyber Security of Cyber Security |
|
Answer» Right choice is (C) Information Security |
|