Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

____________are surveillance softwares to gain fraudulent access to passwords and other confidential information.

Answer»

____________are surveillance softwares to gain fraudulent access to PASSWORDS and other confidential information.
Choose the correct option from below LIST
(1)Copyright
(2)Malware
(3)Trojan
(4)Spyware

Answer:-(4)Spyware

2.

Which is not a OWASP Security Risk.

Answer»

Which is not a OWASP Security Risk.
Choose the correct OPTION from below list
(1)Injection
(2)CSS (XSS SCRIPTING)
(3)Security MISCONFIGURATION
(4)Confidentiality

Answer:-(4)Confidentiality

3.

Open Source software can be freely downloaded, modified and distributed.

Answer»

Open Source software can be freely downloaded, modified and distributed.
Choose the CORRECT option from below list
(1)TRUE
(2)False

Answer:-(2)False

4.

What is the norm ISO that we follow in Information Security Perspective?

Answer»

What is the norm ISO that we follow in Information Security PERSPECTIVE?
Choose the CORRECT option from below list
(1)ISO 27001
(2)ISO 31000
(3)ISO 22301
(4)None of above

Answer:-(1)ISO 27001

5.

What is a DDOS attack?

Answer»

What is a DDOS attack?
First of all full form of DDOS attack which is denial-of-service attack. And now the important aspects of DDOS attack which is to stop intended users to access the website. And attacker tried that RESOURCES will not available to the required users.
Now know comes how attacker will do that attacker will flooded the targeted machine or available resources with superfluous requests which will overload systems and ALSO prevent legitimate requests being fulfilled.
In a DDoS attack incoming traffic flooding the victim originates from MANY different sources. Below are the main points of DDOS attack:-
(1)Main goal is to RENDER the website or service inoperable.
(2)Send as much as artifical traffic so that server or network can ACCOMMODATE.
(3)DDoS attacks are illegal under the Computer Fraud and Abuse Act.
(4)Most coomon DDos attack are
(a)Malware
(b)Viruses

6.

Creating a secured tunnel using IPSEC protocol is called?

Answer» CREATING a secured tunnel using IPSEC protocol is called?
CHOOSE the correct OPTION from below list
(1)VPN
(2)S2S
(3)Citrix
(4)None of above

Answer:-(1)VPN