Tag: security

Questions Related to security

The kind of testing in which activities are performed to find the active machines, open ports and available services, identifying the OS and mapping the network

  1. Passive Scanning

  2. Social Engineering

  3. Scanning

  4. Fuzzing


Correct Option: C
Explanation:

To solve this question, the user needs to know the different types of testing techniques used in cybersecurity. The user must identify the type of testing in which activities are performed to find active machines, open ports, available services, identifying the OS, and mapping the network.

Now, let's go through each option and explain why it is right or wrong:

A. Passive Scanning: This option is incorrect because passive scanning is a type of testing in which the tester monitors network traffic and collects data without actively engaging with the network.

B. Social Engineering: This option is incorrect because social engineering is a type of attack that exploits human behavior to gain access to systems or information.

C. Scanning: This option is correct. Scanning is a type of testing that involves actively probing a network to identify active machines, open ports, available services, identifying the OS, and mapping the network.

D. Fuzzing: This option is incorrect because fuzzing is a type of testing that involves sending random or invalid data to a system to identify vulnerabilities.

The Answer is: C

  1. Mandatory access control

  2. Role Based Access Control

  3. Discretionary Access Control

  4. Biometric access control


Correct Option: B
Explanation:

To answer this question, the user needs to understand the different types of access control mechanisms that can be used to provide access to an SSO application in a portal.

A. Mandatory access control: This access control mechanism is typically used in secure environments such as military or government settings. It is a strict access control mechanism that assigns access levels to users based on their security clearance level. This approach is not suitable for providing access to SSO applications in a portal.

B. Role Based Access Control: This access control mechanism assigns roles to users based on their job functions and responsibilities. The roles are used to determine what type of access a user has to an SSO application. This approach is suitable for providing access to SSO applications in a portal.

C. Discretionary Access Control: This access control mechanism allows users to determine who has access to their resources. This approach is not suitable for providing access to SSO applications in a portal.

D. Biometric access control: This access control mechanism uses biometric data such as fingerprints or facial recognition to authenticate users. This approach is not suitable for providing access to SSO applications in a portal.

Therefore, the best approach to be used while providing access to SSO application in a portal is Role Based Access Control.

The Answer is: B

Which tool can be used for system vulnerability test

  1. Nessus

  2. HP Web Inspect

  3. TAM

  4. SDL


Correct Option: A
Explanation:

The correct answer is A. Nessus.

Nessus is a widely used tool for system vulnerability testing. It helps identify and assess vulnerabilities in various systems and networks. It performs scans to detect potential weaknesses and provides detailed reports on the vulnerabilities found. Nessus is known for its extensive vulnerability database and its ability to perform comprehensive security assessments.

Options B, C, and D are not specifically designed for system vulnerability testing:

B. HP Web Inspect: HP Web Inspect is a web application security testing tool that focuses on identifying vulnerabilities in web applications, rather than system vulnerabilities.

C. TAM: It is unclear what "TAM" refers to in this context. Without more information, it is difficult to determine if it is a tool suitable for system vulnerability testing.

D. SDL: SDL stands for "Security Development Lifecycle," which is a methodology for developing secure software. It is not a specific tool used for system vulnerability testing.

Therefore, option A, Nessus, is the most appropriate tool for system vulnerability testing.

  1. Web cache poisoning

  2. Account Harvesting

  3. Eaves dropping

  4. Cookie Poisoning


Correct Option: D

Name the query language for reading XML document

  1. Xpath

  2. XmlReader

  3. SQL

  4. xmlPlus


Correct Option: A
Explanation:

To read XML documents, the query language used is XPath.

Option A is correct because XPath is a query language used to navigate and select elements and attributes in an XML document. It provides a syntax for addressing specific parts of an XML document, similar to how directories and files are addressed in a file system.

Option B, XmlReader, is incorrect because XmlReader is a .NET class used to read XML documents, but it is not a query language. It provides a way to read XML data sequentially and extract information from it.

Option C, SQL, is incorrect because SQL is a query language used to interact with relational databases, not XML documents.

Option D, xmlPlus, is incorrect because there is no such query language with that name for reading XML documents.

Therefore, the answer is: A. XPath

Which one is not a counter measure for log tampering

  1. Digitally signed and stamped logs

  2. Log file Read/write privilege is controlled by System administrator

  3. Separate logs for system events

  4. Transaction log for all application events


Correct Option: B

AI Explanation

To answer this question, we need to understand what log tampering is and what countermeasures can be used to prevent it.

Log tampering refers to the unauthorized modification or alteration of log files, which can be done to conceal or manipulate information. Countermeasures for log tampering aim to protect the integrity and authenticity of log files.

Let's go through each option to understand why it is a countermeasure or not:

A. Digitally signed and stamped logs - This option is a countermeasure for log tampering. Digitally signing and stamping logs ensures that the logs are authentic and have not been tampered with. Any modification to the logs will invalidate the digital signature or stamp.

B. Log file Read/write privilege is controlled by System administrator - This option is not a countermeasure for log tampering. Controlling read/write privileges for log files is important for access control, but it does not directly prevent log tampering. Even with controlled privileges, a malicious user with the appropriate access rights can still tamper with the log files.

C. Separate logs for system events - This option is a countermeasure for log tampering. Using separate logs for system events can help isolate and protect critical log information. If a malicious user tries to tamper with one set of logs, it will not affect the integrity of the other set of logs.

D. Transaction log for all application events - This option is a countermeasure for log tampering. Maintaining a transaction log for all application events allows for the tracking and verification of actions performed within the application. If log tampering occurs, it can be detected by comparing the transaction log with the actual log files.

The correct answer is B. Log file Read/write privilege is controlled by System administrator. This option is not a countermeasure for log tampering as it focuses on access control rather than directly preventing log tampering.

DMZ is a

  1. DMZ is the place where customers servers are deployed.

  2. DMZ is an area where all the protocols are allowed to pass through.

  3. semi trusted network zone that separates the untrusted internet from the companys trusted internal network

  4. DMZ is cyber warfare terminology


Correct Option: C

AI Explanation

To answer this question, we need to understand what a DMZ (Demilitarized Zone) is.

Option A) DMZ is the place where customers servers are deployed - This option is incorrect. While it is true that servers can be deployed in a DMZ, a DMZ itself is not specifically for customer servers.

Option B) DMZ is an area where all the protocols are allowed to pass through - This option is incorrect. A DMZ does not allow all protocols to pass through. It is designed to allow only specific protocols or services that are necessary for external communication.

Option C) A semi-trusted network zone that separates the untrusted internet from the company's trusted internal network - This option is correct. A DMZ is a network segment that acts as a buffer zone between an organization's trusted internal network and the untrusted external network (such as the internet). It is designed to provide an additional layer of security by isolating externally accessible services from the internal network.

Option D) DMZ is cyber warfare terminology - This option is incorrect. While the term "DMZ" may be used in the context of cyber warfare, in the context of computer networks, a DMZ refers to a specific network configuration.

The correct answer is C) A semi-trusted network zone that separates the untrusted internet from the company's trusted internal network. This option is correct because it accurately describes the purpose and function of a DMZ.

Cookie value gets submitted during POST submit of HTML FORM

  1. SQL Injection

  2. Cross site request forgery

  3. Session fixation

  4. session hijack


Correct Option: C
Explanation:

To solve this question, the user needs to know about common web application vulnerabilities and their characteristics.

The correct answer is: C. Session fixation

Option A, SQL Injection, is incorrect because it is a type of attack that targets the database layer of a web application, not the HTTP protocol layer that handles form submissions.

Option B, Cross Site Request Forgery (CSRF), is incorrect because it involves tricking a user into submitting a form on a different website that performs an action on the user's behalf on a target website, not manipulating the values submitted within a form on the same website.

Option D, Session Hijacking, is incorrect because it involves stealing or guessing a user's session ID to impersonate them on a web application, not manipulating the values submitted within a form.

Option C, Session Fixation, is the correct answer. Session fixation is a type of attack where an attacker sets a user's session ID before the user logs in, then waits for the user to authenticate with that ID. Once the user logs in, the attacker can use the known session ID to access the user's session and perform actions on their behalf. In this case, the attacker could set a cookie value in the HTML form submission and then use that value to access the user's session.

  1. Client side only

  2. server side only

  3. Both client and server side

  4. In the SQL procedure


Correct Option: B

While using "Forgot Password" feature by user to recover the password, what should be checked first

  1. whether the credentials provided are valid and correct

  2. whether account is already disabled

  3. whether account is locked

  4. whether the CAPTCHA values entered by the user same as what is in the image


Correct Option: B