CS205 MID TERM SOLVED MCQs || PAST PAPERS || GROUP-1 || INFORMATION
SECURITY || VuTech
CS205
Information Security
Solved Mid Term Past Papers
______________________________
MCQs
______________________________
Question No: 1
Which of the following cis critical control is discussed in this
module?
a) Secure configuration for network devices
b) Malware defense
c) Boundary defense
d) Data protection
Correct Answer:
The correct answer is 'a'.
Question No: 2
Automated configuration monitoring tools should complaint with which
protocol to streamline reporting?
a) Ffiec
b) Disa
c) Cis
d) Scap
Correct Answer:
The correct answer is 'd'.
Question No: 3
How can authorized wireless access point connected to a wired network can
be detected?
a) Through wireless instruction detection system
b) Through network-based intrusion detection system
c) Through file integrity monitoring solution
d) Through host-based data loss prevention (dlp)
Correct Answer:
The correct answer is 'a'.
Question No: 4
In an enterprise which software’s should be allowed to install and
execute?
a) Any freely available software
b) Only paid software
c) Software’s displayed on notice board
d) Software’s included in whitelist
Correct Answer:
The correct answer is 'd'.
Question No: 5
Why security engineering is placed at layer 3 of transformation
model?
a) Consists of complicated security activities which take more time
and effort
b) Because it’s a low hanging fruit
c) Requires very less and effort
d) Its not very beneficial to implement so kept at the later
stage
Correct Answer:
The correct answer is 'a'.
Question No: 6
The dedicated machine used by administrators for administrative task should
have following features.
a) Have internet access
b) Email and browsing facility available
c) Isolated from organization primary network
d) All routine operational functions can be performed it
Correct Answer:
The correct answer is 'c'.
Question No: 7
As per cis framework what is the best practice to store logs generated from
system?
a) Store logs on the same machine which generates
b) Store logs on a machine other than which generates
c) Store logs on different dispersed location
d) Aggregate logs to a central management system
Correct Answer:
The correct answer is 'd'.
Question No: 8
As per cis critical controls from how many minimum synchronized time
resources all network devices and servers should retrieve time?
a) Three
b) One
c) Two
d) As many as possible
Correct Answer:
The correct answer is 'a'.
Question No: 9
How can an authorized wireless access point connected to a wired network
can be detected and alerts can be generated?
a) Through network vulnerability scanning tools
b) Through file integrity monitoring solution
c) Through host-based data loss prevention (dlp)
d) Through network-based intrusion detection system
Correct Answer:
The correct answer is 'a'.
Question No: 10
Before deploying any new devices in a networked environment what should be
done with passwords?
a) Remove the passwords
b) Keep the default passwords
c) Create very small passwords
d) Change the default passwords
Correct Answer:
The correct answer is 'd'.