CSS Quiz 1 aktu - Scifi Curoisity
  • CSS Quiz 1 aktu

        



    Question 1)  What was the percentage increase in Zero Day Vulnerabilities in the year 2015 ?

    •     4%
    •     50%
    •     100%
    • ->    125%

    Question 2)  Identify the software whose vulnerability is exploited the most ?

    •     Android
    •     ->Browser 
    •     Adobe Flash Player
    •     Microsoft Office

    Question 3) The computer vulnerabilities and exploits databases are maintained by _________.

    •    Kaspersky Lab
    •    Symantec Corporation
    •   -> MITRE Corporation 
    •    None of the above

    • Question 4) Which of the following is/are correct with respect to Ransomware ?

    •     It is a form of Malware
    •     It encrypts the whole hard drive of the computer, essentially locking the user out of the entire system.
    •     It locks the system's screen or locks the users' files unless a ransom is paid.
    • ->All of the above.

     Question 5) What hacking attacks were mentioned in the lesson ?

    •     Hacking in French Election
    •     ATM Hacking in India 
    •     Denial of Service attack in Turkish Bank
    •    ->All of the above

         Question 6) Which of the following is not an advantage of studying Cyber Security ?

    •     It gives you the ability to hack a computer system
    •     It allows you to know the ways through which cyberspace can be breached
    •     Both A and B
    •     ->None of the above

    • Question 7)  Which of the following is considered legal ?

    • Hacking a social media account and sending a private message
    • Hacking a bank account and siphoning funds
    • ->Hacking a company’s security system with permission from the management
    • All of the above


    Question 8) What is the cost of launching Denial of Service attack on a website ?

    • $20/hr
    • $100/day
    • $300/mont
    • ->Both A and B


    Question 9)  Which of the following is correct for silent banker ?

    • It is a trojan horse
    • It records keystrokes, captures screens and steals confidential banking credentials and sends them to a remote attacker
    • ->Both A and B
    • None of the above

    Question 10) Which of the following is not a part of Security System Centric Design ?

    • Policy
    • ->Agreement
    • Mechanisms
    • Threat Models

    Question 11) Which of the following is not a goal in the security system design ?

    • ->Vulnerability.
    • Confidentiality
    • Integrity
    • Availability

    Question 12) Which of the following is most important in design of secure system ?

    • Assessing vulnerability
    • Changing or Updating System according to vulnerability
    • ->Both A and B.
    • None of the above

    Question 13)  Which of the following is correct with respect to Penetration testing ?

    • It is an internal inspection of Applications and Operating systems for security flaws.
    • ->It is an authorized simulated cyber-attack on a computer system, performed to evaluate the security of the system.
    • It is hacking a security system of an organization.
    • All of the above

    Question 14) Which of the following is to be done to avoid limitations in threat models ?

    • Making more explicit and formalized threat models to understand possible weaknesses
    • Making simpler and more general threat models
    • Making less assumptions to design a better threat model
    • ->All of the above.


  • You might also like

    No comments :

    Post a Comment

Featured

CSS Quiz 8 AKTU Prutor

  Q:1.  Password should be combination of ____. (according to the video lecture). 1. Lower case letters only 2. Memorable names and dates 3....

Tags

Recommended Posts

randomposts

Trending This Week

CSS Quiz 5 AKTU

  Q1) Chroot jail is used to _______ process and its children by ________ to the supplied directory name. isolate, changing the root directory ->  change, the name execute, renaming it All of the above Reason :   A  chroot jail  is a way to isolate a process and its children from the rest of the system. It should only be  used  for processes that don't run as root, as root users can break out of the  jail  very easily Q2) Taliking about FreeBSD jail, which of the following is true ? It can only bind to sockets with specified IP address and authorized ports ->  It can communicate with processes inside and outside of jail Root is limited (example: cannot load kernel modules) None of the above Reason :   The jail mechanism is an implementation of FreeBSD's OS-level virtualisation that allows system administrators to partition a FreeBSD-derived computer system into several independent mini-systems called jails, all sharing the sam...

CSS Quiz 8 AKTU Prutor

  Q:1.  Password should be combination of ____. (according to the video lecture). 1. Lower case letters only 2. Memorable names and dates 3. Upper case and lower-case letters, numbers and non letter characters 4. -> Upper case and lower-case letters, numbers and symbols Reason: The key aspects of a strong password are length (the longer the better); a mix of letters (upper and lower case), numbers, and symbols, no ties to your personal information, and no dictionary words Q:2.  The cookies we use, are sent with ______, which in general, _____ the performance. 1. only when requested,improves 2. -> every request, degrades 3. extra information, is useless for 4. None of the mentioned Reason : typically cookies are used for a variety of purposes: ... Cookies impact performance because every time you make a request to a ... an HTML file, a CSS file, an image) the browser will send the cookie in the request to the server. ... request becomes a little bigger and thus perfo...

How to integrate Git bash With Vs code

  # Integrated-VS-code-with-git-bash Let's See How to integrate git bash with vs code  > first you need to oopen setting > sarch setting.json  > then in last you have to paste like these  >      "terminal.integrated.shell.windows": "C:\\Program Files\\Git\\bin\\bash.exe"  Now you will able to use git bash terminal in vs code 

Featured