Pages

CS205 MID TERM SOLVED MCQs || PAST PAPERS || GROUP-1 || INFORMATION SECURITY || VuTech

CS205 MID TERM SOLVED MCQs || PAST PAPERS || GROUP-1 || INFORMATION SECURITY || VuTech

CS205 MID TERM SOLVED MCQs || PAST PAPERS || GROUP-1 || INFORMATION SECURITY || VuTech

Visit Website For More Solutions
www.vutechofficial.blogspot.com

CS205

Information Security

Solved Mid Term Past Papers

______________________________

MCQs

______________________________


Group-1


Question No: 1

Which of the following cis critical control is discussed in this module?


a) Secure configuration for network devices

b) Malware defense

c) Boundary defense

d) Data protection


Correct Answer:


The correct answer is 'a'.


Question No: 2

Automated configuration monitoring tools should complaint with which protocol to streamline reporting?


a) Ffiec

b) Disa

c) Cis

d) Scap


Correct Answer:

 

The correct answer is 'd'.


Question No: 3

How can authorized wireless access point connected to a wired network can be detected?


a) Through wireless instruction detection system 

b) Through network-based intrusion detection system

c) Through file integrity monitoring solution

d) Through host-based data loss prevention (dlp)


Correct Answer: 


The correct answer is 'a'.


Visit Website For More Solutions
www.vutechofficial.blogspot.com


Question No: 4

In an enterprise which software’s should be allowed to install and execute?


a) Any freely available software

b) Only paid software

c) Software’s displayed on notice board

d) Software’s included in whitelist


Correct Answer: 


The correct answer is 'd'.


Question No: 5

Why security engineering is placed at layer 3 of transformation model?


a) Consists of complicated security activities which take more time and effort

b) Because it’s a low hanging fruit

c) Requires very less and effort

d) Its not very beneficial to implement so kept at the later stage


Correct Answer: 


The correct answer is 'a'.


Visit Website For More Solutions
www.vutechofficial.blogspot.com


Question No: 6

The dedicated machine used by administrators for administrative task should have following features.


a) Have internet access

b) Email and browsing facility available

c) Isolated from organization primary network

d) All routine operational functions can be performed it


Correct Answer: 


The correct answer is 'c'.


Question No: 7

As per cis framework what is the best practice to store logs generated from system?


a) Store logs on the same machine which generates

b) Store logs on a machine other than which generates

c) Store logs on different dispersed location

d) Aggregate logs to a central management system


Correct Answer: 


The correct answer is 'd'.


Question No: 8

As per cis critical controls from how many minimum synchronized time resources all network devices and servers should retrieve time?


a) Three

b) One

c) Two

d) As many as possible


Correct Answer: 


The correct answer is 'a'.


Visit Website For More Solutions
www.vutechofficial.blogspot.com


Question No: 9

How can an authorized wireless access point connected to a wired network can be detected and alerts can be generated?


a) Through network vulnerability scanning tools

b) Through file integrity monitoring solution

c) Through host-based data loss prevention (dlp)

d) Through network-based intrusion detection system


Correct Answer: 


The correct answer is 'a'.


Question No: 10

Before deploying any new devices in a networked environment what should be done with passwords?


a) Remove the passwords

b) Keep the default passwords

c) Create very small passwords

d) Change the default passwords


Correct Answer: 


The correct answer is 'd'.


Visit Website For More Solutions
www.vutechofficial.blogspot.com