ISS Statistics Paper I (New 2016 MCQ Pattern): Questions 1 - 4 of 404

Get 1 year subscription: Access detailed explanations (illustrated with images and videos) to 404 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. View Sample Explanation or View Features.

Rs. 300.00 or

Question number: 1

» Computer Application and Data Processing » Network » Firewall

MCQ▾

Question

What is the countermeasure for IP address spoofing?

Choices

Choice (4) Response

a.

To discard all packets that do not analyze the source routing information.

b.

By enforcing a rule that the first fragment of a packet must contain a predefined minimum amount of the transport header.

c.

To discard packets with inside source address if the packet arrives on an external interface.

d.

All of the above

Question number: 2

» Computer Application and Data Processing » Basics of Computer » Assembler

MCQ▾

Question

One pass assembler perform following function/functions:

Choices

Choice (4) Response

a.

It assigns the memory addresses to the variables and translates the source code into machine code in the first pass simultaneously.

b.

It reads the source code twice.

c.

All of the above

d.

Question does not provide sufficient data or is vague

Question number: 3

» Computer Application and Data Processing » Network » Internet

MCQ▾

Question

A virus cannot enter in your computer in following way:

Choices

Choice (4) Response

a.

While installing a program you choose option for an automatic install.

b.

While browsing the Internet, an Internet advertisement or window appears that says your computer is infected or that a unique plug-in is required and you accept the prompt.

c.

While opening an e-mail attachments that contain code from unknown sender.

d.

None of the above

Question number: 4

» Computer Application and Data Processing » Network » Firewall

MCQ▾

Question

Which of the following is/are Common characteristics of a bastion host?

Choices

Choice (4) Response

a.

Each proxy is configured to support all standard application’s command set.

b.

The bastion host hardware platform executes a secure version of its operating system, making it a hardened system.

c.

The bastion host does not require additional authentication before a user is allowed access to the proxy services.

d.

None of the above

Sign In