Cybersecurity | Fresco Play
Question 1: nan
Answer: Denial-of-service attack
Question 2: What is PUP?
Answer: Potentially unwanted program
Question 3: Â monitors user activity on internet and transmit that information in the background to someone else
Answer: Spyware
Question 4: Unsolicited commercial email is known as _
Answer: Spam
Question 5: Internet can impose a number of Risks and hence Cybersecurity is required -
Answer: True
Question 6: A ________ is like a Virus, having the ability to spread without any medium -
Answer: Worm
Question 7: Which of these are Personally Identifiable Information?
Answer: all
Question 8: Which of these is an anti-virus program
Answer: all
Question 9: Â The sole purpose of ________ attack, is to fool the victim and to get all the confidential information
Answer: Phishing
Question 10: If there is a vulnerability but no threat, then there won't be a risk
Answer: True
Question 11: In Symmetric-key cryptography, the key used by the sender and the receiver is
Answer: Shared
Question 12: Risk represents
Answer: Threats times vulnerabilities
Question 13: Cryptography, a word with Greek origins, means
Answer: Secret Writing
Question 14: The Cryptography can provide
Answer: all
Question 15: Detection and Analysis is a continuous process of a cyber-attack for detecting Malware intrusion and their remote connections -
Answer: True
Question 16: Which is a part of a response phase activities ?
Answer: Take appropriate pre-approved or required actions
Question 17: UML component diagram is used to identify how a module validate &processes the data before storing it
Answer: false
Question 18: Incident Category can be defined according to business functional priorities
Answer: true
Question 19: Incidents should be handled on a first come- first serve basis and must be prioritized based on the Business impact
Answer: False
Question 20: Which is not part of a Incident Response Preparation phase ?
Answer: Create appropriate control framework
Question 21: Which is not a set of activity performed to prevent future incidents in Incident management ?
Answer: Mitigate
Question 22: Deep packet inspection can be used to give more context to indicator only
Answer: False
Question 23: A ________ is a credit card sized card with an embedded chip, containing information about the user
Answer: Smart Card
Question 24: Which of these are Threats related to Email Security?
Answer: all
Question 25: Phishing emails include fake notifications from banks and e-payment systems
Answer: True
Question 26: Which of these are examples biometrics?
Answer: all
Question 27: Which of these is TRUE with respect to passwords?
Answer: Passwords need to be atleast 8 chars of length
Question 28: How do we define RADIUS?
Answer: Remote Authentication Dial-In User Service.
Question 29: As an email client, we should not use caution when opening emails and can download any attachments
Answer: False
Question 30: At Operational level threat intelligence real time feed protocols are being used
Answer: True
Question 31: Cyber security architecture is all about understanding one's Business Scope and requirements only
Answer: False
Question 32: Which of the following is not an antivirus software?
Answer: Code Red
Question 33: Network layer firewall works as a
Answer: Packet filter
Question 34: The Cryptography can provide
Answer: all
Question 35: are attempts by individuals to obtain confidential information from you to falsifying their identity
Answer: Spyware scams - wrong
Question 36: Attack which happens due to neglected factors like compromising with security is a type of
Answer: Non-Malicious threat
Question 37: Which helps to determine the effective security controls and measurement techniques
Answer: Threat Modelling
Question 38: A Hacker or disgruntled employee who is interested in specific Asset or information is a type of
Answer: Malicious threat
Question 39: A TCS business operations team required to meet 98% SLA in FY 2017'18 to avoid non-compliance penalty which must be a part of
Answer: Architecture Controls
Question 40: Defining the security control parameter SLA at 98.5% for taking appropriate actions to avoid penalty risk if it goes below 98% must be a part of
Answer: Architecture Risks
Question 41: At Strategic level threat intelligence information can be exchanged within it's operating community
Answer: TRUE
Question 42: The altering of data so that it is not usable unless the changes are undone is
Answer: Encryption
Question 43: It is a program or hardware device that filters the information coming through an internet connection to a network or computer system
Answer: firewall
Question 44: An attempt to make a computer resource unavailable to its intended users is called
Answer: Denial-of-service attack
Question 45: At Tactical level threat intelligence research analysis and reports can be published after malware analysis
Answer: false
Question 46: UEBA stands for
Answer: User Entity and Behavior Analytics
Question 47: ________ is the guarantee of data privacy and protection against unauthorized disclosure.
Answer: Confidentiality
Question 48: Which is a open source data loss prevention solution.
Answer: MyDLQ
Question 49: A ________ is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection.
Answer: VPN
Question 50: Which helps to predict the cybersecurity potential risks effectively ?
Answer: Threat Mitigation
Question 51: The relationship between a character in the plaintext to a character is
Answer: Many-to-one relationship
Question 52: In asymmetric key cryptography, the private key is kept by
Answer: Sender and Receiver
Question 53: They Keys used in Cryptography are
Answer: Single Round
Question 54: Which of the following would most likely not be a symptom of a virus?
Answer: Existing program files and icons disappear
Question 55: In symmetric-key cryptography, the same key is used by
Answer: Both Party
Question 56: which can't be used as a best practice for managing cyber threats ?
Answer: Behavioral Modelling
Question 57: WPA2 is used for security in ________
Answer: Wifi
Question 58: In cryptography, what is cipher?
Answer: ALL
Question 59: In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is.
Answer: Long
Question 60: Which is not a characteristics of Advanced Persistent threats ?
Answer: Full automated
Question 61: Traffic in a VPN is not
Answer: Logically
Post a comment
Get your FREE PDF on "100 Ways to Try ChatGPT Today"
Generating link, please wait for: 60 seconds
Comments
Join the conversation and share your thoughts! Leave the first comment.