InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the following should be covered under the security policy? |
|
Answer» Which of the FOLLOWING should be covered under the SECURITY policy? |
|
| 2. |
Which of the following best finds uncommon and eccentric issues? |
|
Answer» Which of the following best FINDS uncommon and eccentric issues? |
|
| 3. |
A technique of testing without having any knowledge of the internal working of the application |
|
Answer» A technique of testing without having any knowledge of the INTERNAL WORKING of the application |
|
| 4. |
A type of attack that depends on human error rather than on vulnerabilities in the system. |
|
Answer» A type of attack that DEPENDS on human error rather than on vulnerabilities in the system. |
|
| 5. |
During the scanning phase of pen testing, which of the following method analyzes an application s code to determine its behavior during runtime? |
|
Answer» During the SCANNING PHASE of pen testing, which of the following method analyzes an applications CODE to determine its behavior during runtime? |
|
| 6. |
The risk level decreases with increase in the likelihood of potential risk. |
|
Answer» The RISK level decreases with increase in the LIKELIHOOD of POTENTIAL risk. |
|
| 7. |
Reconnaissance in information security is used for _______________ |
|
Answer» RECONNAISSANCE in information SECURITY is used for _______________ Choose the CORRECT option from below list (1)Security reviews (2)Information Analysis (3)Information Gathering (4)Security Testing Answer:-(3)Information Gathering |
|
| 8. |
Assessing security and auditing security mean the same thing. |
|
Answer» Assessing SECURITY and auditing security mean the same thing. |
|
| 9. |
Which of the following exploits psychological manipulation in deceiving users to make security mistakes? |
|
Answer» Which of the FOLLOWING EXPLOITS psychological MANIPULATION in deceiving users to make security mistakes? |
|
| 10. |
A type of computer attack that in which the intruder engages with the targeted system is known as _______________ |
|
Answer» A type of COMPUTER ATTACK that in which the intruder engages with the targeted system is known as _______________ |
|
| 11. |
Which among the following companies have bug bounty programs? |
|
Answer» Which among the following companies have bug BOUNTY programs? |
|
| 12. |
The type of security assessment that aims to test the organization's detection and response capabilities |
|
Answer» The TYPE of security assessment that aims to test the organizations detection and response capabilities |
|
| 13. |
A process that aims to gain information about a system without directly engaging with the system is known as _______________ |
|
Answer» A process that aims to gain information about a SYSTEM without DIRECTLY engaging with the system is known as _______________ |
|
| 14. |
Passive fingerprinting sends and collects traffic to/from the target system. |
|
Answer» PASSIVE fingerprinting SENDS and COLLECTS traffic to from the target system. Choose the correct option from below list (1)True (2)False Answer:-(2)False |
|
| 15. |
Which of the following can be considered as a sound example of social engineering attack? |
|
Answer» Which of the following can be considered as a sound example of social engineering attack? |
|
| 16. |
Which of the following is best used for penetration testing? |
|
Answer» Which of the following is best used for penetration testing? |
|
| 17. |
Which of the following aims to integrate the defensive tactics and controls from the Blue Team with the threats and vulnerabilities found by the Red T |
|
Answer» Which of the FOLLOWING aims to integrate the defensive TACTICS and controls from the Blue Team with the threats and vulnerabilities FOUND by the Red Team into a single objective? |
|
| 18. |
Which of the following assessment type works to determine whether a threat made/detected, is genuine? |
|
Answer» Which of the following assessment type works to determine WHETHER a threat made DETECTED, is genuine? |
|
| 19. |
Which among the following involves evaluating security against a standard to check for complaince? |
|
Answer» Which AMONG the following involves evaluating security against a STANDARD to check for complaince? |
|
| 20. |
A type of testing with limited knowledge of the internal working of an application |
|
Answer» A TYPE of TESTING with limited KNOWLEDGE of the INTERNAL working of an application |
|
| 21. |
Which among the following aims at bringing the level of acceptable risk and the current risk level in line? |
|
Answer» Which AMONG the following aims at bringing the level of acceptable risk and the current risk level in LINE? |
|
| 22. |
The process that involves analyzing entities like TCP and ICMP to identify an application or an operating system |
|
Answer» The process that involves analyzing entities like TCP and ICMP to IDENTIFY an application or an OPERATING system |
|
| 23. |
The type of vulnerability scan that facilitates access to low-level data. |
|
Answer» The type of vulnerability scan that facilitates access to low level data. |
|