Kerala PSC Previous Years Question Paper & Answer

Title : IT Officer - Kerala State Co-operative Bank Ltd
Question Code : A

Page:12


Below are the scanned copy of Kerala Public Service Commission (KPSC) Question Paper with answer keys of Exam Name ' IT Officer - Kerala State Co-operative Bank Ltd' And exam conducted in the year 2023. And Question paper code was '232/2023'. Medium of question paper was in Malayalam or English . Booklet Alphacode was 'A'. Answer keys are given at the bottom, but we suggest you to try answering the questions yourself and compare the key along wih to check your performance. Because we would like you to do and practice by yourself.

page: 12 out of 18
Excerpt of Question Code: 232/2023

73.

74.

75.

76.

77.

Which type of firewall operates at the application layer of the OSI model, making filtering
decisions based on the content of the traffic?

(4) Packet filtering firewall ൯) Stateful firewall
(C) Application layer firewall (D) Proxy firewall

Why is Unified Threat Management (UTM) considered a comprehensive security solution for
modern networks?

(A) Because UTM devices integrate various security features like firewall, antivirus,
intrusion detection, VPN, and more into a single device, simplifying management
and improving security posture

(B) Because UTM devices have faster processing capabilities than other firewall
types, allowing them to handle higher traffic loads

(C) Because UTM devices offer specialized protection for specific applications, making
them highly targeted and effective against advanced threats

(D) Because UTM devices are standalone security appliances that do not require
regular updates or maintenance

What is a imitation of signature-based Intrusion Detection Systems (IDS)?
(^) They can detect zero-day attacks effectively
(B) They may generate a high number of false positives
(C) They are less resource-intensive compared to anomaly-based IDS

(D)_ They are not suitable for detecting known attack patterns

Ina site-to-site VPN, what is the purpose of the tunneling protocol?
(A) To encrypt the data for secure transmission
(13) To establish a secure connection between the VPN clients

(C) To manage key exchange between VPN devices

(D) To authenticate users accessing the VPN

When conducting a forensic investigation, which step is typically performed first?
(A) Collection of evidence
(B) Preservation of evidence
(C) Analysis of evidence

(D) Identification of potential digital evidence sources

232/2023 14 A

Similar Question Papers

Ask Question

(Press Ctrl+g to toggle between English and the chosen language)


Questions & Answers

IT Officer - Kerala State Co-operative Bank Ltd : Video