Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Possible threat to any information cannot be ________________(a) reduced(b) transferred(c) protected(d) ignoredThe question was posed to me in exam.Question is from Information Security Technologies topic in section Cyber Security of Cyber Security

Answer»

The correct choice is (d) ignored

Explanation: When there LIES a threat to any system, SAFEGUARDS can be implemented, outsourced, distributed or transferred to some other system, protected USING security TOOLS and techniques but cannot be ignored.

2.

Compromising confidential information comes under _________(a) Bug(b) Threat(c) Vulnerability(d) AttackI got this question in a national level competition.My enquiry is from Information Security Technologies in portion Cyber Security of Cyber Security

Answer»

The correct option is (b) Threat

Best explanation: Threats are ANYTHING that may cause damage or HARM to a computer system, individual or any information. Compromising of CONFIDENTIAL information means EXTRACTING out SENSITIVE data from a system by illegal manner.

3.

Lack of access control policy is a _____________(a) Bug(b) Threat(c) Vulnerability(d) AttackI have been asked this question by my college director while I was bunking the class.The doubt is from Information Security Technologies topic in portion Cyber Security of Cyber Security

Answer»

The correct CHOICE is (C) Vulnerability

To explain: Access control policies are incorporated to a SECURITY system for restricting of unauthorised access to any logical or physical system. Every security compliance PROGRAM must need this as a fundamental COMPONENT. Those systems which lack this feature is vulnerable.

4.

_______ technology is used for analyzing and monitoring traffic in network and information flow.(a) Cloud access security brokers (CASBs)(b) Managed detection and response (MDR)(c) Network Security Firewall(d) Network traffic analysis (NTA)I have been asked this question in final exam.I'd like to ask this question from Information Security Technologies in division Cyber Security of Cyber Security

Answer»

The correct option is (d) Network TRAFFIC analysis (NTA)

To EXPLAIN I would say: Network traffic analysis (NTA) is an approach of information SECURITY for SUPERVISING the traffic in any network, a flow of data over the network as well as malicious threats that are trying to breach the network. This technological solution also helps in triage the events detected by Network Traffic ANALYSING tools.

5.

The full form of EDR is _______(a) Endpoint Detection and recovery(b) Early detection and response(c) Endpoint Detection and response(d) Endless Detection and RecoveryThe question was asked in semester exam.The above asked question is from Information Security Technologies in division Cyber Security of Cyber Security

Answer»

Correct option is (c) Endpoint Detection and response

For explanation: It is a collective name for tools that monitor networks & endpoints of systems and record all the ACTIVITIES for further reporting, analysis & detection in a central database. Analyzing the reports GENERATED through such EDR tools, loopholes in a system or any internal, as WELL as external breaching attempts can be DETECTED.

6.

Which of the following information security technology is used for avoiding browser-based hacking?(a) Anti-malware in browsers(b) Remote browser access(c) Adware remover in browsers(d) Incognito mode in a browserThis question was addressed to me at a job interview.I'd like to ask this question from Information Security Technologies in section Cyber Security of Cyber Security

Answer»

Right option is (b) REMOTE browser access

To elaborate: Cyber-criminals target browsers for breaching information security. If a user establishes a remote browsing by isolating the browsing session of END user, cyber-criminals will not be able to infect the SYSTEM along with browser with malware, ultimately reducing the attack SURFACE area.

7.

_____ platforms are used for safety and protection of information in the cloud.(a) Cloud workload protection platforms(b) Cloud security protocols(c) AWS(d) One DriveI have been asked this question during an interview.This question is from Information Security Technologies in portion Cyber Security of Cyber Security

Answer» RIGHT option is (a) Cloud WORKLOAD protection platforms

The best I can explain: Nowadays data centres support workloads from different geographic locations across the globe through PHYSICAL systems, virtual machines, servers, and clouds. Their security can be MANAGED using Cloud workload protection platforms which MANAGE policies regarding security of information irrespective of its location.
8.

From the options below, which of them is not a vulnerability to information security?(a) flood(b) without deleting data, disposal of storage media(c) unchanged default password(d) latest patches and updates not doneThe question was asked during an internship interview.This question is from Information Security Technologies in division Cyber Security of Cyber Security

Answer»

Correct choice is (a) FLOOD

Easy EXPLANATION: Flood COMES under natural disaster which is a threat to any information and not acts as a VULNERABILITY to any system.

9.

From the options below, which of them is not a threat to information security?(a) Disaster(b) Eavesdropping(c) Information leakage(d) Unchanged default passwordThe question was posed to me during an internship interview.Enquiry is from Information Security Technologies in division Cyber Security of Cyber Security

Answer» RIGHT option is (d) UNCHANGED default password

For explanation: DISASTER, eavesdropping and information leakage come under information security threats whereas not changing the default password of any system, hardware or any software comes under the CATEGORY of vulnerabilities that the USER may pose to its system.
10.

_______ is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.(a) Network Security(b) Database Security(c) Information Security(d) Physical SecurityI had been asked this question in unit test.Asked question is from Information Security Technologies topic in chapter Cyber Security of Cyber Security

Answer»

Right choice is (C) Information Security

Easy explanation: Information Security (abbreviated as InfoSec) is a process or set of processes used for PROTECTING VALUABLE information for alteration, destruction, deletion or disclosure by UNAUTHORISED users.