Tag: security

Questions Related to security

  1. The British Standards Institute (BSI) 7799

  2. ISO 27002

  3. The Open Web Application Security Project (OWASP) Top Ten Project

  4. TSP-Secure


Correct Option: C
  1. Access control lists (ACLs)

  2. Capability lists

  3. Triples

  4. Properties


Correct Option: A
  1. Systems Security Engineering Capability Maturity Model (SSE-CMM)

  2. Capability Maturity Model Integration (CMMi)

  3. Bell-LaPadula model

  4. Systems Engineering Capability Maturity Model (SE-CMM)


Correct Option: A

Which of the following replicates itself by attaching to other programs?

  1. A worm

  2. A virus

  3. a trojan horse

  4. a multipart virus


Correct Option: B
  1. Detective

  2. Corrective

  3. Preventive

  4. Administrative


Correct Option: C
  1. Brute force

  2. Denial of service

  3. Buffer overflow

  4. ICMP Sting


Correct Option: D

If a security was not part of the development of a database, how is it usually handled?

  1. Through cell suppression

  2. By a trusted backend

  3. By a trusted front-end

  4. By views


Correct Option: C

What does it mean if someone says they were a victim of Bluejacking attack?

  1. An unsolicited message was sent

  2. A cell phone was cloned

  3. An IM channel introduced a worm

  4. Traffic was analyzed


Correct Option: A

AI Explanation

To answer this question, you need to understand what Bluejacking is. Bluejacking is a type of cyber attack that involves sending unsolicited messages or spam to Bluetooth-enabled devices, such as mobile phones, laptops, or tablets. The purpose of bluejacking is usually mischievous or annoying rather than malicious.

Let's go through each option to understand why it is correct or incorrect:

Option A) An unsolicited message was sent - This option is correct because bluejacking involves sending unsolicited messages to Bluetooth-enabled devices.

Option B) A cell phone was cloned - This option is incorrect. Bluejacking does not involve cloning a cell phone.

Option C) An IM channel introduced a worm - This option is incorrect. Bluejacking does not involve introducing worms through an IM (Instant Messaging) channel.

Option D) Traffic was analyzed - This option is incorrect. Bluejacking does not involve analyzing traffic.

The correct answer is A) An unsolicited message was sent. This option is correct because bluejacking is a type of attack where unsolicited messages are sent to Bluetooth-enabled devices.