Question 1) What was the percentage increase in Zero Day Vulnerabilities in the year 2015 ?
- 4%
- 50%
- 100%
- -> 125%
- Android
- ->Browser
- Adobe Flash Player
- Microsoft Office
Question 3) The computer vulnerabilities and exploits databases are maintained by _________.
- Kaspersky Lab
- Symantec Corporation
- -> MITRE Corporation
- None of the above
- Question 4) Which of the following is/are correct with respect to Ransomware ?
- It is a form of Malware
- It encrypts the whole hard drive of the computer, essentially locking the user out of the entire system.
- It locks the system's screen or locks the users' files unless a ransom is paid.
- ->All of the above.
Question 5) What hacking attacks were mentioned in the lesson ?
- Hacking in French Election
- ATM Hacking in India
- Denial of Service attack in Turkish Bank
- ->All of the above
Question 6) Which of the following is not an advantage of studying Cyber Security ?
- It gives you the ability to hack a computer system
- It allows you to know the ways through which cyberspace can be breached
- Both A and B
- ->None of the above
- Question 7) Which of the following is considered legal ?
- Hacking a social media account and sending a private message
- Hacking a bank account and siphoning funds
- ->Hacking a company’s security system with permission from the management
- All of the above
Question 8) What is the cost of launching Denial of Service attack on a website ?
- $20/hr
- $100/day
- $300/mont
- ->Both A and B
Question 9) Which of the following is correct for silent banker ?
- It is a trojan horse
- It records keystrokes, captures screens and steals confidential banking credentials and sends them to a remote attacker
- ->Both A and B
- None of the above
Question 10) Which of the following is not a part of Security System Centric Design ?
- Policy
- ->Agreement
- Mechanisms
- Threat Models
Question 11) Which of the following is not a goal in the security system design ?
- ->Vulnerability.
- Confidentiality
- Integrity
- Availability
Question 12) Which of the following is most important in design of secure system ?
- Assessing vulnerability
- Changing or Updating System according to vulnerability
- ->Both A and B.
- None of the above
Question 13) Which of the following is correct with respect to Penetration testing ?
- It is an internal inspection of Applications and Operating systems for security flaws.
- ->It is an authorized simulated cyber-attack on a computer system, performed to evaluate the security of the system.
- It is hacking a security system of an organization.
- All of the above
Question 14) Which of the following is to be done to avoid limitations in threat models ?
- Making more explicit and formalized threat models to understand possible weaknesses
- Making simpler and more general threat models
- Making less assumptions to design a better threat model
- ->All of the above.
No comments :
Post a Comment