Search Header Logo

BCSE317L - Information Security Quiz-2

Authored by Manjula R

Computers

University

Used 8+ times

BCSE317L - Information Security Quiz-2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the two main types of firewall used in network security?

Packet-filter firewall and proxy-based firewall

Hardware firewall and software firewall

Firewall 1 and Firewall 2

Firewall A and Firewall B

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What distinguishes a packet-filter firewall from a proxy firewall in a corporate network?

A packet-filter firewall is more expensive than a proxy firewall

A packet-filter firewall is designed for remote offices, while a proxy firewall is for headquarters

A packet-filter firewall is software-based, while a proxy firewall is hardware-based

A packet-filter firewall filters based on network and transport layer headers, while a proxy firewall filters based on the application layer

3.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

In a deauthentication attack, which device is typically the first target?

Router firewall
Access point
End-user device
Ethernet switch

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is true about data security?

Data security is the protection of programs and data in computers and communication systems against unauthorized access

It refers to the right of individuals or organizations to deny or restrict the collection and use of information

Data security requires system managers to reduce unauthorized access to the systems by building physical arrangements and software checks.

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common database security attack that exploits vulnerabilities in web applications to manipulate database queries?

Phishing

SQL Injection

Brute-force attack

Denial of Service (DoS)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves an attacker gaining unauthorized access to a database by impersonating a legitimate user or by exploiting weak authentication mechanisms?

Cross-Site Scripting (XSS)

Man-in-the-Middle (MitM)

Brute-force attack

Denial of Service (DoS)

None

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of database auditing in database security?

To encrypt sensitive data

To prevent unauthorized access to data

To monitor database activity

To hide sensitive data from authorized users

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?