Cybersecurity | Fresco Play

Cybersecurity | Fresco Play

Monday, May 22, 2023
~ 7 min read
Cybersecurity | Fresco Play

Question 1: nan

Answer: Denial-of-service attack


Question 2: What is PUP?

Answer: Potentially unwanted program


Question 3:  monitors user activity on internet and transmit that information in the background to someone else

Answer: Spyware


Question 4: Unsolicited commercial email is known as _

Answer: Spam


Question 5: Internet can impose a number of Risks and hence Cybersecurity is required -

Answer: True


Question 6: A ________ is like a Virus, having the ability to spread without any medium -

Answer: Worm


Question 7: Which of these are Personally Identifiable Information?

Answer: all


Question 8: Which of these is an anti-virus program

Answer: all


Question 9:  The sole purpose of ________ attack, is to fool the victim and to get all the confidential information

Answer: Phishing


Question 10: If there is a vulnerability but no threat, then there won't be a risk

Answer: True


Question 11: In Symmetric-key cryptography, the key used by the sender and the receiver is

Answer: Shared


Question 12: Risk represents

Answer: Threats times vulnerabilities


Question 13: Cryptography, a word with Greek origins, means

Answer: Secret Writing


Question 14: The Cryptography can provide

Answer: all


Question 15: Detection and Analysis is a continuous process of a cyber-attack for detecting Malware intrusion and their remote connections -

Answer: True


Question 16: Which is a part of a response phase activities ?

Answer: Take appropriate pre-approved or required actions


Question 17: UML component diagram is used to identify how a module validate &processes the data before storing it

Answer: false


Question 18: Incident Category can be defined according to business functional priorities

Answer: true


Question 19: Incidents should be handled on a first come- first serve basis and must be prioritized based on the Business impact

Answer: False


Question 20: Which is not part of a Incident Response Preparation phase ?

Answer: Create appropriate control framework


Question 21: Which is not a set of activity performed to prevent future incidents in Incident management ?

Answer: Mitigate


Question 22: Deep packet inspection can be used to give more context to indicator only

Answer: False


Question 23: A ________ is a credit card sized card with an embedded chip, containing information about the user

Answer: Smart Card


Question 24: Which of these are Threats related to Email Security?

Answer: all


Question 25: Phishing emails include fake notifications from banks and e-payment systems

Answer: True


Question 26: Which of these are examples biometrics?

Answer: all


Question 27: Which of these is TRUE with respect to passwords?

Answer: Passwords need to be atleast 8 chars of length


Question 28: How do we define RADIUS?

Answer: Remote Authentication Dial-In User Service.


Question 29: As an email client, we should not use caution when opening emails and can download any attachments

Answer: False


Question 30: At Operational level threat intelligence real time feed protocols are being used

Answer: True


Question 31: Cyber security architecture is all about understanding one's Business Scope and requirements only

Answer: False


Question 32: Which of the following is not an antivirus software?

Answer: Code Red


Question 33: Network layer firewall works as a

Answer: Packet filter


Question 34: The Cryptography can provide

Answer: all


Question 35: are attempts by individuals to obtain confidential information from you to falsifying their identity

Answer: Spyware scams - wrong


Question 36: Attack which happens due to neglected factors like compromising with security is a type of

Answer: Non-Malicious threat


Question 37: Which helps to determine the effective security controls and measurement techniques

Answer: Threat Modelling


Question 38: A Hacker or disgruntled employee who is interested in specific Asset or information is a type of

Answer: Malicious threat


Question 39: A TCS business operations team required to meet 98% SLA in FY 2017'18 to avoid non-compliance penalty which must be a part of

Answer: Architecture Controls


Question 40: Defining the security control parameter SLA at 98.5% for taking appropriate actions to avoid penalty risk if it goes below 98% must be a part of

Answer: Architecture Risks


Question 41: At Strategic level threat intelligence information can be exchanged within it's operating community

Answer: TRUE


Question 42: The altering of data so that it is not usable unless the changes are undone is

Answer: Encryption


Question 43: It is a program or hardware device that filters the information coming through an internet connection to a network or computer system

Answer: firewall


Question 44: An attempt to make a computer resource unavailable to its intended users is called

Answer: Denial-of-service attack


Question 45: At Tactical level threat intelligence research analysis and reports can be published after malware analysis

Answer: false


Question 46: UEBA stands for

Answer: User Entity and Behavior Analytics


Question 47: ________ is the guarantee of data privacy and protection against unauthorized disclosure.

Answer: Confidentiality


Question 48: Which is a open source data loss prevention solution.

Answer: MyDLQ


Question 49: A ________ is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection.

Answer: VPN


Question 50: Which helps to predict the cybersecurity potential risks effectively ?

Answer: Threat Mitigation


Question 51: The relationship between a character in the plaintext to a character is

Answer: Many-to-one relationship


Question 52: In asymmetric key cryptography, the private key is kept by

Answer: Sender and Receiver


Question 53: They Keys used in Cryptography are

Answer: Single Round


Question 54: Which of the following would most likely not be a symptom of a virus?

Answer: Existing program files and icons disappear


Question 55: In symmetric-key cryptography, the same key is used by

Answer: Both Party


Question 56: which can't be used as a best practice for managing cyber threats ?

Answer: Behavioral Modelling


Question 57: WPA2 is used for security in ________

Answer: Wifi


Question 58: In cryptography, what is cipher?

Answer: ALL


Question 59: In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is.

Answer: Long


Question 60: Which is not a characteristics of Advanced Persistent threats ?

Answer: Full automated


Question 61: Traffic in a VPN is not

Answer: Logically


Post a comment

Comments

Join the conversation and share your thoughts! Leave the first comment.

Get your FREE PDF on "100 Ways to Try ChatGPT Today"

Generating link, please wait for: 60 seconds

Checkout all hot deals now 🔥

Search blogs

No blog posts found