Cybersecurity Prologue
Cybersecurity Prologue
All
________ monitors user activity on internet and transmit that information in the
background to someone else.
Spyware
What is PUP?
Potentially unwanted program
The sole purpose of ________ attack, is to fool the victim and to get all the
confidential information
Phishing
In Symmetric-key cryptography, the key used by the sender and the receiver is
Shared
Incidents should be handled on a first come- first serve basis and must be
prioritized based on the Business impact.
False
UML component diagram is used to identify how a module validate &processes the data
before storing it.
False
Deep packet inspection can be used to give more context to indicator only.
False
Phishing emails include fake notifications from banks and e-payment systems.
True
A type of malware that demands a ransom if the victim wants his or her files back
is called ________
Ransomware
________ are often delivered to a PC through an email attachment and are often
designed to do harm.
Virus
A TCS business operations team required to meet 98% SLA in FY 2017'18 to avoid non-
compliance penalty which must be a part of
Architecture Controls is wrong
Which of the following is an independent malicious program that does not need any
host program?
Worm
At Operational level threat intelligence real time feed protocols are being used.
True
--------------------------------------not sure----------------------------
Defining five levels of SLA security controls each from 98.9 to 98.5 respectively
to control penalty risk must be a part of
Architecture Controls is wrong ,Architecture Monitoring ,Architecture Requirements
Traffic in a VPN is not ________
Invisible from public networks
Which helps to determine the effective security controls and measurement techniques
?
Threat Modelling
Which helps to prevent the cyber-attacks using various security related tools,
policies, best practices and guidelines ?
Threat Assessment
Attack which happens due to neglected factors like compromising with security is a
type of
Specific threat
Cyber security architecture is all about understanding one's Business Scope and
requirements only.
true