Summary

This document contains a sample quiz on cyber security, with questions on various concepts like cyber security, threat landscape, and malware forms.

Full Transcript

1: What is cyber security? A. It is the collection of technologies, standards, policies and management practices that are applied to digital information to keep it secure B. It is only using technology to keep digital information secure C. It is just using the best policy to k...

1: What is cyber security? A. It is the collection of technologies, standards, policies and management practices that are applied to digital information to keep it secure B. It is only using technology to keep digital information secure C. It is just using the best policy to keep digital information secure D. None of the above 2: Why is cyber security important? A. In today's high technology environment, organisations are becoming more and more dependent on their information systems B. Due to hype in the media about cyber security C. The threats from traditional brick and motor criminals are on the rise D. Many organisations who are still using offline payment system are depending on cyber security 3: What are the three basic cyber security concepts? A. Confidentiality, Integrity and Access B. Consideration, Integrity, and Availability C. Confidentiality, Integrity, Availability D. None of the above DR M Y Siyal Q1-1 4: You visit an organization’s website and you realized that you are able to view sensitive files on their web server. Even though it is not your fault, it is still considered a cyber security breach? A. True B. False 5: Verifying that users are who they say they are and that each input arriving at the system came from a trusted source. A. Authenticity B. Integrity C. Confidentiality D. None of the above 6: List the three stages in the plan-protect-respond cycle. A. Planning, protection, and response B. Planning, Checking and protecting C. Plan, do and check D. None of the above DR M Y Siyal Q1-2 7: In plan, protect and response cycle, which stage consumes the most time? A. Protection B. Planning C. Response D. All three take the same time 8: How is protection defined? A. Protection is defined as the plan-based creation of operation and countermeasures B. To use technologies to protect against attacks C. To use policy-based protection to protect against attacks D. All of the above 9: How is the response defined? A. Response is defined as recovery according to plan B. Punish the attackers so that they don’t attack again C. Attack the attackers and destroy their abilities to attack again D. None of the above DR M Y Siyal Q1-3 10: Why there is need to understand cyber security Threat landscape? A. We will not be able to defend as we will not know how are the attackers and how are they going to attack us B. Business requirements make it essential to understand it C. It is requirement of information cyber security policy, so we have no choice D. None of the above 11: Automation, speed and action at distance are adding online attack? A. True B. False 12: Most obvious reason (s) for cyber security attacks is (are): A. Privacy violations B. Criminal attacks C. Publicity attacks D. Legal attacks E. All of the above DR M Y Siyal Q1-4 13: The fabrication of information that is purported to be from someone who is not actually the author is called A. Masquerading B. Eavesdropping C. Spoofing D. None of the above 14: Malware is a generic term for “evil/malicious software” A. True B. False 15: Distinguish between viruses and worms A. Virus needs a host program while worms are full program and don’t need a host program B. Both are same C. Worm cannot be detected by antivirus program, while virus can be detected D. None of the above DR M Y Siyal Q1-5 16: The interruption or degradation of a data service or information access is called A. Denial of service B. Non-repudiation C. Masquerading D. None of the above 17: How do most viruses spread between computers today? A. Mostly via email messages, but also through thumb drives, file sharing programs, downloading infected programs from a malicious website, social networking sites. B. By installing mobile applications C. Hackers cracking your password D. None of the above 18: What is a Logic Bomb? A. It gives the impression that it is useful program however in reality it is harmful B. Malicious codes that execute when a certain predefined events occurs. C. A Virus which bypasses the antivirus program D. None of the above DR M Y Siyal Q1-6 19: What are the likely motivations for hackers A. Financial gain, publicity and espionage B. They are too smart and want people to know about it C. They do it for a challenge D. They do it as they are bored E. All of the above 20: What is a virus or worm payload? A. It is a virus or worm designed for mobile devices B. Payloads are pieces of code that do damage C. Payload is just a computer jargon for virus D. None of the above 21: What is the definition of hacking. A. When you share your password with someone B. Hacking is intentionally accessing a computer resource without authorization or in excess of authorization. C. When you reset your password and don’t encrypt it D. None of the above DR M Y Siyal Q1-7 22: What is spyware? A. Spyware refers to a broad spectrum of Trojan horse programs that gather information about you and make it available to an attacker. B. When you visit a suspicious website and are infected C. When you browse a website, and you are infected with adware D. None of the above 23: Why can cookies be dangerous? A. Cookies can record too much sensitive information about you and could become spyware B. Cookies can never be dangerous as it is now legally allowed on any web sites C. Cookies were only dangerous in the past D. None of the above 24: What is social engineering? A. Social Engineering means using social networks B. Social engineering attacks take advantage of flawed human judgment by convincing the victim to take actions that are counter to security policies. C. Social Engineering is technical term for reverse engineering in IT field D. None of the above DR M Y Siyal Q1-8 25: What is spam? A. Spam is unsolicited commercial e-mail. B. When your computer is infected with a ransomware C. When your mailbox is full D. None of the above 26: What is phishing? A. Phishing means when your computer has a virus B. Phishing attack victims receive an email message that appears to come from a bank or another firm with which the victim does business C. It is a technical term for Ransomware D. A and C 27: How can social engineering be used to get access to a sensitive file? A. Simply by asking someone to send the file or to give access to the file by tricking the user B. Using brute force attack to find password C. Cracking password using social networks D. None of the above DR M Y Siyal Q1-9

Use Quizgecko on...
Browser
Browser