EXAM CSCU
Essential Cybersecurity Knowledge Quiz
Test your knowledge of cybersecurity with our comprehensive quiz designed to challenge your understanding of important concepts and practices.
Whether you're a student or a professional, you'll encounter:
- Questions covering data security
- Insights into malware and protection techniques
- Scenarios on online safety and privacy issues
Which of the following websites can Windows Phone users use to locate their stolen smartphone?
ICloud.com
Http://www.symbianguru.com/tracking-mobile-with-phone- guardian.html
Account.microsoft.com/devices d- android.com/device manager
Ruth Cole is a sales manager and travels extensively on business. She regularly updates and stores clients’ data on a remote data storage device via the Internet, so that in case she loses her laptop or it crashes for some reason, she does not lose the data which is essential to carrying out her work. Which type of data backup is Emma using to carry out her daily work?
Online data backup
Differential backup
Full system backup
Incremental backup
Which privacy issue of clouds exposes users to the risk of their data being? Accessed by the cloud service provider without the user’s consent?
Data migration
Data ownership
Data permanency
Data location
Luke works as an analyst for AS Pvt. Ltd. His job there is to analyst statistics and records obtained from people to improve the sales of the company. However, recently the statistics and records given to him have been incorrect, thus leading to gross miscalculations and wrong predictions on his part. Which of the terms listed below, best describes these statistics and records that are incorrect?
Information
Data
Indicator
Archives
Daniel, a bank officer, communicates with his clients through emails on a daily basis. Recently, he noticed that his Gmail inbox was filled with unsolicited emails. The cluttered inbox annoyed him, as it was difficult to filter the important emails. Hence, he decided to find a solution for it. Upon inquiry, a service provider told him that he could use software which automatically filters out the unsolicited emails. This software would not only protect his Gmail account, but also protect all the email accounts configured on his email client. Which of the following tools did Daniel probably enquire about?
Spam fighter
Norton
Kaspersky
Avast pro
Fred, a 14 years-old boy, is an only child. Fred loves spending time on his Mac OS X browsing the internet. When his parents are not at home, he spends hours at a stretch on the computer. Once, when Fred’s parents come home late from work and find him on the Mac, they decided to limit his computer time. Enabling an inbuilt feature in the Mac, Fred’s parents limit his computer time to two hours daily. Which MAC OS X feature did Fred’s parents enable?
UAC slider bar
File Vault
Parental control
Jump lists
Which of the following terms refers to software that attackers create to Install on a victim’s computer in order to compromise its security?
Lockbin
Dropbox
Bitlocker
Malware
Which of the following terms refers to the process that ensures accuracy of the sender and receiver of a message?
Availability
Data
Authenticity
Nonrepudiation
Which of the following software programs runs on the internet and allows users to find, access, and display web pages?
Extensions
Web browsers
Search engine
Email
A guest account should be ..............
Preferably disabled
Created as a separate login
G I v e n executable rights
Used for administration alone
A ‘private’ folder in Windows XP is ..............
A folder that is not shared
A hidden folder
A n encrypted folder
A privately shared folder
The default port on which http listens is .............
23
110
139
80
The three types of Registry values are called...........
String, Binary, DWORD
String, Numerical and Binary
D WOR D , Numerical and Ascii
Binary, DWORD, Ascii
Name the attack where a person is tricked into disclosing information
Time Bomb
Backdoors
Keylogging
Social Engineering
Event viewer is used for .................
Viewing progress of events
Viewing web events in real time
V I ew I ng mail analysis of events
Viewing system log of events
Which service listens on port 25?
POP
FTP
Telnet
SMTP
Which option will you choose to share files more securely?
HTTPS WebDAV folders
P2P networks
Share your root drive
FTP sites
The folders in windows registry editor is called ............ And the content called ............
Notes, values
Values, keys
K ey s , notes
Keys, values
Which of the following statements are wrong in the context of “Downloading files“?
Never save the file in the root directory of the computer
Files must be scanned for viruses/Malware prior to using them
Before opening the file, save all other work and close other programs
It is safe to open a file or run a program directly from location
As part of his security implementation plan, Glenn was updating his firewall. Which aspect of the security implementation plan was Glenn working on?
Precaution
Nonrepudiation
Reaction
Maintenance
Which of the following terms refers to a collection of information that defines or describes the user and his or her interests?
Profile
Facebook group
TimeLine
Account settings
Isaac is transferring all the data from his computer to an external drive as he wants to format his laptop. While moving the data, he accidentally Hit’s delete instead of cut on one of the files and without realizing, hit The enter key when the computer prompted to confirm his action. As the file was a huge one, it did not go to the recycle bin and got permanently deleted.
Computer virus
Human error
Hardware theft
Software failure
Raymond received an email from an official claiming to be from his bank. The email requested Raymond to send his personal details since the customer database of the bank was being updated. Upon confirmation from the bank, Raymond was told that the bank had not sent any emails asking for the personal details of their customers.
Man in the middle attack
War driver
Phishing
Eavesdropping
John is an 18 year-old college-going student. He loves to read books and listen to music on his laptop. He regularly downloads e-books and music from the internet. Lately, whenever John has been spending time on his laptop, the laptop begins displaying the infamous Blue Screen of Death (BSOD). Upon taking his laptop to the service center, John was told that his laptop was infected with malware. Which symptom of malware infection is John’s laptop displaying?
Hard drive malfunction
Unexpected crashes
Slow system
Laptop screen malfunction
Harry, a 21 year-old college-going student, was working on his dissertation when suddenly a message flashed on his screen, « All files on your computer have been encrypted. You must pay $1000 within 72 hours to regain access to your data. » Even after Harry paid the money, he was not able to access his data, and all the documents on his dissertation were lost. Which malware attack was Harry a victim of?
Adware
Virus
Botnet
Ransomware
Which of the following terms refers to the process of protecting information, and the infrastructure that stores it?
Data security
Maintenance
Keystroke logging
Availability
Susan downloaded a software from the Internet and install did on her computer for watching movies online. After installing the software, she noticed that her PC was slowing down and was taking more time to open webpages. What could Susan don to solve this problem?
Install a latest antivirus software and scan her computer
Stop using wireless internet connection
Start using Ethernet
Choose a suitable encryption method
Susan, a 15 year-old girl, loves spending her free time baking and cycling. However, recently she has been spending all of her free time glued to the computer. She shows no interest in her hobbies anymore and looks depressed most of the time. Her parents also noticed that whenever they enter her room, she quickly changes the computer screen. Understandably, Susan’s parents are worried about her. What could be the reason for her behavior?
Unsolicited emails
Victim of online child abuse
Too much pressure at school
Social engineering
Which of the following fundamental concepts of security refers to an action taken in advance to protect the system against threats or dangers?
Precaution
Nonrepudiation
Reaction
Maintenance
Which of the following antivirus techniques refers to the process of comparing the current state of stored programs to a previously recorded state, which is known to be free of malware?
Integrity checking
Heuristics analysis
Scanning
Bookmarks method
While using peer to peer networks which of the following precautions would you use?
Scan all downloaded files using AV software
You can safely transmit passwords in P2P networks
U s e a reliable client software
Share files and folders selectively
Trojans are otherwise known as
Backdoors
Virus
Worm
Troy
Which of the following would you consider as a good password?
Lms#456JkzX8
13Locksmnith
B ee tl ej ui ce $
James Brown
This tool can capture passwords when typed from the keyboard
Eavesdropper
Keylocker
Entrapper
Keylogger
Services are programs that ..................
Starts when an application is abruptly closed
Starts when MS office starts
Starts when the user connects to the Internet
Starts up when the system boots
Security is a ............
Ongoing process
A snapshot of a system in time
One time initiative
Theoretical concept
Working away from the office gives you more freedom to disregard your Company’s security standards and policies. (True or False)
True
False
Computer viruses are most commonly spread by:
Opening e-mail attachments
Choosing weak computer passwords
Reading jokes on the Internet
Downloading picture from the web
Which of the following is the best example of a strong password?
Dad1969 (something easy to remember like a name and birth date)
Pa44w0rd (a word that substitutes numbers for some of the letters)
Peter%0ffic3 (a name or phrase that mixes uppercase and lowercase Letters, numbers and symbols)
Good2go (a phrase that mixes letters and numbers)
............... Is a database that stores all installation of Windows OS
Access
Event viewer
Logs
Registry
Alex, the coach of Manchester United, called up Wayne, the captain of the team, todiscuss the tactics they would employ in the upcoming Champions League Final. The following day, Alex received an email with the transcript of the conversation he had with Wayne. The sender of the email threatened to make Alex’s tactics public, if he did not pay him $5000. Which form of mobile device attack was Alex a victim of?
Phishing
Social engineering
Man in the middle attack
Eavesdropping
A newly established ITES company plans to launch a website which enables its users to share pictures and videos with each other. Apart from this, user can also comment on these pictures and share them further. Under which of the following cloud categories will the company’s product Come?
Private Cloud
Hybrid Cloud
Community cloud
Public Cloud
Andrew lost his iPhone on the way home from college. He anxiously wanted to recover it, as it was gift from his late grandfather. The iPhone also contained pictures that he had taken for a national photography contest. Using which iOS feature, can Andrew locate his phone?
Find my iPhone
System updates
ICloud backup
SIM lock
Which of the following is an encryption program in Mac that helps users to protect their data?
Safari
FileVault
SPAMfighter
Lockbin
Sam uses his work laptop to watch pirated movies at home sometimes. When he tried to watch the latest movie he downloaded, the movie file did not play even after trying on several different players. Within a day of this, Sam noticed that many of his files were vanishing one after the other from his laptop even though neither he nor anyone else deleted them. The network administrator. Of his company, after taking a look at his computer told him that the movie files, which did not play, definitely had something to do with this peculiar behavior. What type of data loss could this be?
Human error
Natural disaster
Software failure
Computer virus
Horace is a 64 year-old man who worked as an accountant for SN Associates before his retirement. The company gifted him a laptop at the time of his retirement. Since Horace was not a technically savvy person, he did not install any applications on his laptop, and only use it for checking his email and playing poker online. After some time, Horace’s laptop started giving him problems. It crashed frequently, often displayed the Blue Screen of Death (BSOD), and unwanted windows kept popping up whenever he went online. When Horace took his laptop to the service center, he was told that his laptop was infected with malware. Which software should Horace have installed to prevent malware infection in his laptop?
Skype
One drive
Antivirus software
Adobe Reader
Lucy, a 55 year-old woman, was not a technically savvy person. She did not install or enable any applications on her computer, and only use did for looking up recipes and knitting patterns. After some time, Lucy’s computer started giving her problems. It often displayed the Blue Screen of Death (BSOD) and unwanted windows kept popping up whenever she went online. When a computer technician checked Lucy’s computer, it was discovered that her computer was infected with malware. Which inbuilt Windows software should Lucy have enabled to prevent malware infection in her computer?
Windows Defender
Task manager
Simple file sharing
Jump lists
magine getting a letter from the Island Revenue Authority of Singapore (IRAS) demanding that you pay $5,700 in taxes. This is what happened to Rick. He received a letter informing him that he owed the government unpaid income tax on wages he never earned. The IRAS letter said that Rick had worked at several places. However, Rick is only 15 years old and only job was working at his uncle’s grocery store during the summer. He had never even visited some of the places where the letter said he worked. Rick was not sure what to do next. After all, he has never even had a ‘‘real’’ job like those listed in the letter. What is going on is this scenario?
Social engineering
Phishing
Nigerian scam
Identity Theft
Sally is a 16 year-old high school student who is extremely attached to her laptop. She uses it to download and watch episodes of her favorite sitcom. While watching one of the episode, her laptop switched off automatically a couple of times. Suspecting a malware infection, she opened the antivirus software on her laptop and choose a technique, which examined all files on the memory and hard disk in order to identify and locate the malware. Which antivirus technique did Sally employ?
Integrity checking
Bookmarks method
Heuristics analysis
Scanning
Ellie, an 18 year-old student, shares her Windows computer with her younger brother, Adam. Adam is very mischievous and whenever he is on the computer, he ruins Ellie’s assignments. Ellie, who is fed up of this decides to encrypt the drive that contains her assignments. She uses inbuilt Windows software to encrypt the drive so that Adam cannot access the drive. Which software did Ellie use?
SPAMfighter
Adobe
BitLocker
Skype
Choose the correct statement.
Threat is a potential violation of security
Threat is a defined way to breach security through a vulnerability
Threat is the existence of weakness or implementation error
Threat is an assault on system security
What is an incident?
Misuse of computer resources by running malicious codes
An undesired event of violating the security of a computer
All of the above
Gain unauthorized access to computers
When you login to your computer, you ................
Identify and authorize
Authenticate and validate
Identify and authenticate
Authenticate and reinforce
A strong password will be a combination of
Letters in caps and small forms
Letters, numbers and special characters
Numbers only
Letters only
Which command displays all current TCP/IP network configuration values? (Select 2 answers)
Ping
Netstat
Netcong
Ipconfig
Which statement is correct with regard to patch management?
Patches are occasionally sent over email
Only operating system patches need to be applied
Patches should be downloaded only from the vendor site
Not applying application patches cannot lead to system compromise
SSID is the ................
Secure ID given to an individual browsing on a wireless LAN
Application of SSL in a wireless LAN
Name of a wireless local area network
Encryption of data over radio waves to avoid interception
Which program executes when a certain condition is met?
Logic Bomb
Time Bomb
Worms
Virus
To restrict visiting Internet sites, you can modify the settings of your ......
ISP
O.S
Modem
Web Browser
If you had to secure a folder completely, which option will you choose?
Rename the folder
Encrypt the folder
Zip the folder
Hide the folder
InfraTech Inc. Is an international IT company with offices in Dubai, Singapore, and Australia. To have continuity of business practice, it is imperative that all the branch offices be able to communicate amongst themselves. Which of the following network systems would be suitable for data communication between the employees of all branches of InfraTech Inc.?
Local Area Network
Wide Area Network
Ethernet
Virtual Private Network
This part of an email informs you about the address from where it came, time of the message, data sent, and the subject line. Identify the email part?
Body
Footer
Header
Signature
Sarah has recently rented a small room on ABC Street, and started a business withseven employees. She provided every employee with a computer and a common printer which is meant to be shared by everyone. Which of the following networks would suit Sarah’s business need?
Local Area Network
Wide Area Network
Ethernet Physical Layer
Virtual Private Network
You received the following email from an official claiming to be from your bank. Dear ABC Bank User, Since we will be updating our customer database shortly, you are kindly requested to send the following information. Name Bank login id Password Branch Date of birth Alternate email Please click the below link to update your details. Proceed to update your account details. Please contact the ABC Bank customer team in case of any queries. Thank you for your cooperation. Which type of email security threat is this?
Spy-phishing
Phishing
Malicious email attachment
Nigerian Scam
Duke is taking some of the best pictures he has yet as an amateur photographer in a pen drive to get his work assessed by an expert. On the subway an unknown person picks his pocket. Along with his wallet Duke also lost the pen drive with his pictures. Since he had not made any more copies of those pictures, he lost them forever. What type of data loss is this?
Natural disaster
Malware attack
Software theft
Hardware theft
Amy received an email from an official claiming to be from ABC Parcel Services. The email asked her to collect a gift parcel sent by her friend three weeks ago. The service claimed that they were unable to deliver the parcel to Amy, as the address provided was wrong. The service asked her to print out the attached invoice copy, fil lit, and collect the package from the branch office located in her city. Which type of email threat could Amy have faced, if she clicked or downloaded the attachment?
Malicious user redirection
Hoax mail
Malicious email attachment
Phishing
XYZ I nfra Solutions, a startup company is looking for a cloud service provider who can provide virtual machines, virtual local area network, customized software applications, on demand storage, IP addresses, and firewalls to meet its business needs. Which of the following cloud computing services can meet the business needs of the company?
Infrastructure as a Service
Software as a Service
Platform as a Service
Application as a Service
Which of the following software programs runs on the internet and allows users to find, access, and display web pages?
Extensions
Web browsers
Email
Search engine
Certain software applications add or modify a particular feature in a browser. A few versions allow users to block ads, watch online videos, or IM with friends. What is this application called?
Cookies
ActiveX
Extensions
Java
Harold, an associate at AQ Corporation, received a phone call from a person claiming to be Bob from the IT department. Bob told Harold that he had noticed that Harold’s computer was running slow, and could help him fix it. Harold, not having much knowledge regarding computers, readily agreed. Following Bob’s instructions, Harold typed in some commands on his computer, and gave remote access to Bob to have his computer fixed. Later on, Harold noticed that confidential information concerning his clients was missing from his computer. Which attack was Harold a victim of?
Bluesnarfing
War driver
Evil twin
Social engineering
When someone on the Internet or a network tries to connect to your computer, it is called “unsolicited request“. When your computer gets unsolicited request, Windows Firewall blocks the connection. In Microsoft Windows XP Service Pack 2(SP2), Windows Firewall is turned on by default. (True or False)
True
False
Which key combinaison in Windows will lock your workstation?
Ctrl + Shift + Del
Alt + Shift + Del
( Windows key) + L
Alt + Shift + Ctrl
What should you do if you receive a call from someone in your computer support department asking for your password?
Ask them why they need the password. If the reason sounds legitimate, go ahead and give it to them
Give it to them without question
Inform them that there is no reason they should need your password And refuse to give it to them
Send the password via e-mail to ensure you’re giving it to the right Person.
Choose the correct statement
Security is only a one stage process
Software flaws can be absolutely eliminated
E v o l ut I o n of technology did little to increase ease of use
The skill level needed to conduct an exploit has decreased
To verify if you are on a secure page, you will check for
Http:// in the URL and handcuff sign on the page
Http:// in the URL and padlock sign on the page
Https:// in the URL and padlock sign on the page
Https:// in the URL and handcuff sign on the page
In asymmetric encryption
Two private keys are used
A public and private key are used
Similar keys are used
Two public keys are used
To find out which ports are open, which of the following commands will you use at the command prompt?
Netstat-a
Nbstat-a
Netbios-a
Netshow-a
Which of the following option would you choose to secure e-mail messages?
Digital photograph
Digital voice
Digital autograph
Digital signature
Security features help to prevent people from gaining access to information that you have not given them permission to access, such as credit card information you enter when shopping on the Internet. Security features can also protect your computer from unsafe software. Security features in Internet Explorer (XP SP2) include: (Select 4 answers)
16-bit secure connection to using secure Web sites (SSL)
The ability to update, disable, or re-enable Web browser add-ons.
Digital signatures, which verify that a file comes from the person or publisher it claims to be from, and that no one has tampered with it since it was digitally signed.
The ability to block most pop-up windows.
Enhanced security features to warn you when a Web site is trying to download files or software to your computer.
Denial of service occurs when
ISPs notify a down time to users
Legitimate users are denied access to resources
Illegitimate users are prevented from using resources
An organization denies access to certain sites
You received the following email from an official claiming to be from your bank. Dear ABC Bank User, Since we will be updating our customer database shortly, you are kindly requested to send the following information. Name Bank login id Password Branch Date of birth Alternate email Please click the below link to update your details. Proceed to update your account details. Please contact the ABC Bank customer team in case of any queries. Thank you for your cooperation. Which type of email security threat is this?
Spy-phishing
Malicious email attachment
Nigerian Scam
Phishing
Which of the following terms refers to malicious software that is specifically built to target mobile phones and smartphones systems?
Unmanaged applications
Mobile malware
Broken cryptography
Phishing
Which of the following is the strongest password?
Donna1992
Domike*
Donnamike92
Pa#72tLe
A new online service allows people living with roommates to feed in all their house hold expenses in its ‘share calculator’ program. The program then calculates how much each person is supposed to pay and sends a detailed report to all those who are listed as roommates for that particular transaction. The above mentioned service is an example of which of the following?
Software as a Service
Network as a Service
Platform as a Service
Infrastructure as a Service
Which of the following helps to backup data on a Mac?
Internet Accounts
Extensions
Time Machine
App Store
What does a lock icon symbolize besides a website name?
The website cannot be accessed without the site admin’s permission
The website needs a password to be accessed
The website is a secure website
The website is not accessible at the moment
Hermione is a 21 year-old college student. She loves spending time on Facebook. However, with her final exams approaching, she feels that spending time Facebook will harm her exam results.Hence, she enables a particular Facebook feature, with the help of which, she will not get any emails or notifications from Facebook.
Deactivate account
Where you’re logged in
Login alerts
Who can look me up?
Samuel, a network admin in an IT firm, has just discovered a phishing site known for targeting corporate entities. Several employees have received emails with the domain name, which is the same as that of the following defense mechanisms can Samuel use to implement this?
Firewall
Encryption
Virus
Disk encryption
What is a «cookie»?
A cookie is a file created by an Internet site to store information on Your computer
A cookie is a file encryption utility
A cookie is a spyware program
A cookie is a dynamic link library (dll) loaded when Windows starts
Which of the following statements are false?
Encryption involves protecting a file by hiding them into an another file or message so that only authorized users can access the file
All applications can be identified by using a task manager
A ut h e nti c I ty of DLL files downloaded from third party sources cannot be trusted.
File integrity can be checked by using MD5 checksum
Choose the correct statement from the following
An antivirus is not needed when a firewall filters all ports
A personal firewall will check all attachments for malware
A n antivirus eliminates the need for a firewall
A personal firewall protects systems from Internet attacks to a certain extent
Highest macro security is used in-------------------by default in MS Office applications.
Access
Excel
Word
PowerPoint
What is a zombie machine?
A machine that does not respond to any instructions
A machine that is dependent on another machine for resources
A machine that does not have a hard drive
A machine that accepts and acts on instructions from another machine
Which of the following statements is wrong regarding good password management?
Do not change passwords frequently
Do not write down your passwords
D o not use easily guessable passwords
Do not share your passwords
What are the three most common risks associated with « surfing the Web? » (Select 3 answers)
Theft of credit card information
Theft of personal identify and other private information
Contamination by a virus or other malicious code
Overloading computer system resources
Which of the following statements is wrong regarding good password management?
Do not change passwords frequently
Do not write down your passwords
D o not use easily guessable passwords
Do not share your passwords
How would you activate SSL on your system?
Register with a security provider such as Verisign
Use the SSL extension in your URL (https)
Download a SSL certificate from a secure server
There is no need to do anything to activate SSL
Events are of two types namely________and___________events
Application and Security
Execution and Security
Application and Log
Application and Execution
What is Regedt32.exe?
Registered editor for 32 bit systems
Registered event viewer
Registry editor
Registered editor for windows
To restrict visiting Internet sites, you can modify the settings of your ......
ISP
Modem
O . S
Web Browser
{"name":"EXAM CSCU", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge of cybersecurity with our comprehensive quiz designed to challenge your understanding of important concepts and practices.Whether you're a student or a professional, you'll encounter:Questions covering data securityInsights into malware and protection techniquesScenarios on online safety and privacy issues","img":"https:/images/course7.png"}
More Surveys
Make your own Survey
- it's free to start.
- it's free to start.