Tag: security

Questions Related to security

Which of the following HTTP method should be used to accept form data?

  1. GET

  2. POST

  3. PUT

  4. GET OR POST OR PUT


Correct Option: B
  1. Credit Card Numbers cannot be stored in database

  2. Credit Card numbers can be stored in database but not in plain text

  3. Avoid storing credit card numbers if not necessary

  4. Option 1 AND Option 3

  5. Opion 2 AND Opion 3

  6. None of above


Correct Option: E

what is ment by Brute force attack?

  1. finding users in data base

  2. to attck viruses

  3. to get user ans password from servers

  4. none of above


Correct Option: C

which logic used for hide process in rootkits?

  1. change priority in processors

  2. add process id to services process id

  3. change the running files with this virus files

  4. entering into system files


Correct Option: B,C

can we conmmbine any execute(exe file) process to pictures or images?

  1. True

  2. False


Correct Option: A
  1. Process explorer

  2. autoruns

  3. rootkit retriveler

  4. ms office


Correct Option: A,B,C
  1. vb scripts

  2. batch file scripts

  3. autoit scripts

  4. all the above


Correct Option: A,B,C

which software languages are very useful to cerate viruses ??

  1. batch file scripts

  2. vb scripts

  3. autoit scripts

  4. all the above


Correct Option: D

we can not control mouse using vb scripts.

  1. True

  2. False


Correct Option: B

"3DES" stands for...

  1. 3 DES

  2. Triple DES

  3. Triple Disk Encryption System

  4. Triple Disk Encoding System


Correct Option: B