Tag: security

Questions Related to security

  1. Rother J

  2. Creeper

  3. Wabbit virus

  4. Elk Cloner


Correct Option: B

Identify the Name of the security risk in the below scenario : Malicious script echoed back into HTML returned from a trusted site, and runs under trusted Context

  1. Cross Site scripting

  2. SQL Injection

  3. Session Fixation

  4. Cross Site Request Forgery


Correct Option: A

Authenticating a user without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.

  1. Phishing

  2. Injection flaws

  3. Session Fixation

  4. Http Response splitting attack


Correct Option: C

This attack uses malicious code masqueraded as a trusted application. The malicious code can be injected on benign applications, masqueraded in e-mail links, or sometimes hidden in JavaScript pages to make furtive attacks against vulnerable internet Browsers.

  1. Trojan horse

  2. Spyware

  3. Man in the middle attack

  4. HTTP Request Smuggling


Correct Option: A

This is a network layer attack consisting of capturing packets from the network transmitted by others' computers and reading the data content in search of sensitive information like passwords, session tokens, or any kind of confidential information.

  1. Network Eavesdropping

  2. Man in the Middle

  3. Page Hijacking

  4. Path Manipulation


Correct Option: A
  1. AES - 256

  2. DES II

  3. AES - 192 and above

  4. Serpant


Correct Option: C

When did the Public Key Crypto graphy Emerge

  1. 1980s

  2. 1970s

  3. 1990s

  4. 1975 or above


Correct Option: B