NEOCODE

Advanced Security MCQs

TRAPDOORS & BACKDOORS

1. A backdoor in a cryptographic system is:

Correct Answer: a) A secret method to bypass security mechanisms

Explanation:
A backdoor is a hidden entry point that bypasses normal authentication procedures, often intentionally created but potentially exploited by attackers.

2. Trapdoors are often introduced by:

Correct Answer: a) Developers for debugging but exploited by attackers

Explanation:
Developers may leave trapdoors for legitimate debugging purposes, but these become security vulnerabilities if discovered and exploited by malicious actors.

3. Which of the following is a real-world example of a backdoor?

Correct Answer: a) Dual_EC_DRBG (NSA's cryptographic backdoor)

Explanation:
Dual_EC_DRBG was a pseudorandom number generator with a suspected NSA backdoor, allowing potential decryption of communications using a secret key.

4. How can backdoors be prevented?

Correct Answer: a) Code audits and secure development practices

Explanation:
Prevention methods include: rigorous code reviews, secure coding standards, removing debugging code before production, and using checksums to detect modifications.

CACHE POISONING & OTHER ATTACKS

5. DNS Cache Poisoning redirects users to fake websites by:

Correct Answer: a) Modifying DNS resolver cache with false entries

Explanation:
Attackers inject fraudulent DNS records into resolver caches, causing domain names to resolve to malicious IP addresses instead of legitimate ones.

6. ARP Cache Poisoning is used in:

Correct Answer: a) Man-in-the-Middle (MITM) attacks

Explanation:
ARP poisoning associates the attacker's MAC address with the IP address of another host, intercepting network traffic intended for that host.

7. Which attack exploits the trust between a client and server by hijacking a session?

Correct Answer: a) Session Hijacking

Explanation:
Session hijacking involves stealing or predicting session tokens to impersonate legitimate users and gain unauthorized access to systems.

8. A zero-day exploit refers to:

Correct Answer: a) A vulnerability unknown to the vendor, with no patch available

Explanation:
Zero-day exploits target undisclosed vulnerabilities, giving developers "zero days" to fix them before attacks occur, making them particularly dangerous.

MISCELLANEOUS SECURITY CONCEPTS

9. Which of the following is a preventive measure against security vulnerabilities?

Correct Answer: a) Regular software updates and patches

Explanation:
Timely patching closes known vulnerabilities. Other preventive measures include: secure coding, least privilege, defense in depth, and security awareness training.

10. The principle of least privilege means:

Correct Answer: a) Users/programs get minimal access needed

Explanation:
Least privilege limits damage from accidents or attacks by ensuring entities operate with only the permissions essential for their legitimate purpose.

11. Which attack floods a network with excessive requests to disrupt services?

Correct Answer: a) Denial-of-Service (DoS) Attack

Explanation:
DoS attacks overwhelm systems with traffic (e.g., SYN floods) to make resources unavailable. DDoS uses multiple compromised systems for larger-scale attacks.

12. An example of a non-technical security threat is:

Correct Answer: a) Social Engineering (e.g., phishing)

Explanation:
Social engineering manipulates human psychology rather than exploiting technical vulnerabilities. Examples include phishing, pretexting, baiting, and tailgating.