CSS Quiz 1 aktu - Scifi Curoisity
  • CSS Quiz 1 aktu

        



    Question 1)  What was the percentage increase in Zero Day Vulnerabilities in the year 2015 ?

    •     4%
    •     50%
    •     100%
    • ->    125%

    Question 2)  Identify the software whose vulnerability is exploited the most ?

    •     Android
    •     ->Browser 
    •     Adobe Flash Player
    •     Microsoft Office

    Question 3) The computer vulnerabilities and exploits databases are maintained by _________.

    •    Kaspersky Lab
    •    Symantec Corporation
    •   -> MITRE Corporation 
    •    None of the above

    • Question 4) Which of the following is/are correct with respect to Ransomware ?

    •     It is a form of Malware
    •     It encrypts the whole hard drive of the computer, essentially locking the user out of the entire system.
    •     It locks the system's screen or locks the users' files unless a ransom is paid.
    • ->All of the above.

     Question 5) What hacking attacks were mentioned in the lesson ?

    •     Hacking in French Election
    •     ATM Hacking in India 
    •     Denial of Service attack in Turkish Bank
    •    ->All of the above

         Question 6) Which of the following is not an advantage of studying Cyber Security ?

    •     It gives you the ability to hack a computer system
    •     It allows you to know the ways through which cyberspace can be breached
    •     Both A and B
    •     ->None of the above

    • Question 7)  Which of the following is considered legal ?

    • Hacking a social media account and sending a private message
    • Hacking a bank account and siphoning funds
    • ->Hacking a company’s security system with permission from the management
    • All of the above


    Question 8) What is the cost of launching Denial of Service attack on a website ?

    • $20/hr
    • $100/day
    • $300/mont
    • ->Both A and B


    Question 9)  Which of the following is correct for silent banker ?

    • It is a trojan horse
    • It records keystrokes, captures screens and steals confidential banking credentials and sends them to a remote attacker
    • ->Both A and B
    • None of the above

    Question 10) Which of the following is not a part of Security System Centric Design ?

    • Policy
    • ->Agreement
    • Mechanisms
    • Threat Models

    Question 11) Which of the following is not a goal in the security system design ?

    • ->Vulnerability.
    • Confidentiality
    • Integrity
    • Availability

    Question 12) Which of the following is most important in design of secure system ?

    • Assessing vulnerability
    • Changing or Updating System according to vulnerability
    • ->Both A and B.
    • None of the above

    Question 13)  Which of the following is correct with respect to Penetration testing ?

    • It is an internal inspection of Applications and Operating systems for security flaws.
    • ->It is an authorized simulated cyber-attack on a computer system, performed to evaluate the security of the system.
    • It is hacking a security system of an organization.
    • All of the above

    Question 14) Which of the following is to be done to avoid limitations in threat models ?

    • Making more explicit and formalized threat models to understand possible weaknesses
    • Making simpler and more general threat models
    • Making less assumptions to design a better threat model
    • ->All of the above.


  • You might also like

    No comments :

    Post a Comment

Featured

CSS Quiz 8 AKTU Prutor

  Q:1.  Password should be combination of ____. (according to the video lecture). 1. Lower case letters only 2. Memorable names and dates 3....

Tags

Recommended Posts

randomposts

Trending This Week

Featured