Tag: security

Questions Related to security

  1. The British Standards Institute (BSI) 7799

  2. ISO 27002

  3. The Open Web Application Security Project (OWASP) Top Ten Project

  4. TSP-Secure


Correct Option: C
  1. Access control lists (ACLs)

  2. Capability lists

  3. Triples

  4. Properties


Correct Option: A

What model describes those characteristics of security engineering processes essential to ensure good security engineering?

  1. Systems Security Engineering Capability Maturity Model (SSE-CMM)

  2. Capability Maturity Model Integration (CMMi)

  3. Bell-LaPadula model

  4. Systems Engineering Capability Maturity Model (SE-CMM)


Correct Option: A
  1. A worm

  2. A virus

  3. a trojan horse

  4. a multipart virus


Correct Option: B
  1. Detective

  2. Corrective

  3. Preventive

  4. Administrative


Correct Option: C
  1. Brute force

  2. Denial of service

  3. Buffer overflow

  4. ICMP Sting


Correct Option: D
  1. Through cell suppression

  2. By a trusted backend

  3. By a trusted front-end

  4. By views


Correct Option: C

What does it mean if someone says they were a victim of Bluejacking attack?

  1. An unsolicited message was sent

  2. A cell phone was cloned

  3. An IM channel introduced a worm

  4. Traffic was analyzed


Correct Option: A

AI Explanation

To answer this question, you need to understand what Bluejacking is. Bluejacking is a type of cyber attack that involves sending unsolicited messages or spam to Bluetooth-enabled devices, such as mobile phones, laptops, or tablets. The purpose of bluejacking is usually mischievous or annoying rather than malicious.

Let's go through each option to understand why it is correct or incorrect:

Option A) An unsolicited message was sent - This option is correct because bluejacking involves sending unsolicited messages to Bluetooth-enabled devices.

Option B) A cell phone was cloned - This option is incorrect. Bluejacking does not involve cloning a cell phone.

Option C) An IM channel introduced a worm - This option is incorrect. Bluejacking does not involve introducing worms through an IM (Instant Messaging) channel.

Option D) Traffic was analyzed - This option is incorrect. Bluejacking does not involve analyzing traffic.

The correct answer is A) An unsolicited message was sent. This option is correct because bluejacking is a type of attack where unsolicited messages are sent to Bluetooth-enabled devices.