CS205 MID TERM SOLVED MCQs || PAST PAPERS || GROUP-1 || INFORMATION SECURITY || VuTech
Visit Website For More Solutions
www.vutechofficial.blogspot.com
CS205
Information Security
Solved Mid Term Past Papers
______________________________
MCQs
______________________________
Group-1
Question No: 1
Which of the following cis critical control is discussed in this module?
a) Secure configuration for network devices
b) Malware defense
c) Boundary defense
d) Data protection
Correct Answer:
The correct answer is 'a'.
Question No: 2
Automated configuration monitoring tools should complaint with which protocol to streamline reporting?
a) Ffiec
b) Disa
c) Cis
d) Scap
Correct Answer:
The correct answer is 'd'.
Question No: 3
How can authorized wireless access point connected to a wired network can be detected?
a) Through wireless instruction detection system
b) Through network-based intrusion detection system
c) Through file integrity monitoring solution
d) Through host-based data loss prevention (dlp)
Correct Answer:
The correct answer is 'a'.
Visit Website For More Solutions
www.vutechofficial.blogspot.com
Question No: 4
In an enterprise which software’s should be allowed to install and execute?
a) Any freely available software
b) Only paid software
c) Software’s displayed on notice board
d) Software’s included in whitelist
Correct Answer:
The correct answer is 'd'.
Question No: 5
Why security engineering is placed at layer 3 of transformation model?
a) Consists of complicated security activities which take more time and effort
b) Because it’s a low hanging fruit
c) Requires very less and effort
d) Its not very beneficial to implement so kept at the later stage
Correct Answer:
The correct answer is 'a'.
Visit Website For More Solutions
www.vutechofficial.blogspot.com
Question No: 6
The dedicated machine used by administrators for administrative task should have following features.
a) Have internet access
b) Email and browsing facility available
c) Isolated from organization primary network
d) All routine operational functions can be performed it
Correct Answer:
The correct answer is 'c'.
Question No: 7
As per cis framework what is the best practice to store logs generated from system?
a) Store logs on the same machine which generates
b) Store logs on a machine other than which generates
c) Store logs on different dispersed location
d) Aggregate logs to a central management system
Correct Answer:
The correct answer is 'd'.
Question No: 8
As per cis critical controls from how many minimum synchronized time resources all network devices and servers should retrieve time?
a) Three
b) One
c) Two
d) As many as possible
Correct Answer:
The correct answer is 'a'.
Visit Website For More Solutions
www.vutechofficial.blogspot.com
Question No: 9
How can an authorized wireless access point connected to a wired network can be detected and alerts can be generated?
a) Through network vulnerability scanning tools
b) Through file integrity monitoring solution
c) Through host-based data loss prevention (dlp)
d) Through network-based intrusion detection system
Correct Answer:
The correct answer is 'a'.
Question No: 10
Before deploying any new devices in a networked environment what should be done with passwords?
a) Remove the passwords
b) Keep the default passwords
c) Create very small passwords
d) Change the default passwords
Correct Answer: