0% found this document useful (0 votes)
219 views

Cybersecurity Prologue

- The document contains questions and answers related to cybersecurity topics such as anti-virus programs, personally identifiable information, spyware, potential unwanted programs, risks of the internet, spam, cryptography, phishing attacks, risk assessment, symmetric-key cryptography, incident prioritization, open source data loss prevention solutions, incident categories, malware detection and analysis, ransomware, virtual private networks, phishing scams, cybersecurity threat intrusion phases, computer virus symptoms, cyber threat management best practices, cryptography definitions, worms, asymmetric key cryptography, firewall functions, advanced persistent threats characteristics, single round keys in cryptography, cyber vulnerability exploit groups, threat modeling processes, cybersecurity threat definitions, botmaster attacks, proactive cybersecurity risk prediction

Uploaded by

Shantha Moorthy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
219 views

Cybersecurity Prologue

- The document contains questions and answers related to cybersecurity topics such as anti-virus programs, personally identifiable information, spyware, potential unwanted programs, risks of the internet, spam, cryptography, phishing attacks, risk assessment, symmetric-key cryptography, incident prioritization, open source data loss prevention solutions, incident categories, malware detection and analysis, ransomware, virtual private networks, phishing scams, cybersecurity threat intrusion phases, computer virus symptoms, cyber threat management best practices, cryptography definitions, worms, asymmetric key cryptography, firewall functions, advanced persistent threats characteristics, single round keys in cryptography, cyber vulnerability exploit groups, threat modeling processes, cybersecurity threat definitions, botmaster attacks, proactive cybersecurity risk prediction

Uploaded by

Shantha Moorthy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 5

Which of these is an anti-virus program

All

Which of these are Personally Identifiable Information?


All

________ monitors user activity on internet and transmit that information in the
background to someone else.
Spyware

What is PUP?
Potentially unwanted program

Internet can impose a number of Risks and hence Cybersecurity is required.


True

Unsolicited commercial email is known as __


spam

The Cryptography can provide


All

________ is the guarantee of data privacy and protection against unauthorized


disclosure
Confidentiality

The sole purpose of ________ attack, is to fool the victim and to get all the
confidential information
Phishing

Risk represents ________


Threats times vulnerabilities.

In Symmetric-key cryptography, the key used by the sender and the receiver is
Shared

If there is a vulnerability but no threat, then there won't be a risk.


True

In symmetric-key cryptography, the same key is used by


shared

Incidents should be handled on a first come- first serve basis and must be
prioritized based on the Business impact.
False

Which is a open source data loss prevention solution.


MyDLP

Incident Category can be defined according to business functional priorities.


True

Detection and Analysis is a continuous process of a cyber-attack for detecting


Malware intrusion and their remote connections.
True

UML component diagram is used to identify how a module validate &processes the data
before storing it.
False

Which is a part of a response phase activities ?


Take appropriate pre-approved or required actions

Deep packet inspection can be used to give more context to indicator only.
False

Which is not a set of activity performed to prevent future incidents in Incident


management ?
Mitigate

Which of these are examples biometrics?


All

Which of these are Threats related to Email Security?


All

Phishing emails include fake notifications from banks and e-payment systems.
True

Which of these is true with respect to passwords?


Passwords need to be atleast 8 chars of length

Exploring appropriate and ethical behaviors related to online environments and


digital media
Cyber Ethics

How do we define RADIUS?


Remote Authentication Dial-In User Service.

WPA2 is used for security in __


Wi-Fi

Which of the following is not an antivirus software?


Code Red

UEBA stands for


User Entity and Behavior Analytics

Which observes the behavior of the malware in a sandbox-virtual environment to


prevent the malware from actually infecting production systems.
Dynamic Analysis

A type of malware that demands a ransom if the victim wants his or her files back
is called ________
Ransomware

In symmetric-key cryptography, the same key is used by ____________.


both party

A ________ is an extension of an enterprise’s private intranet across a public


Network such as the Internet across a public Network such as the Internet, creating
a secure private connection.
VPN

Network layer firewall works as a ______


Packet filter
________ are attempts by individuals to obtain confidential information from you to
falsifying their identity.
Phishing scams

Which one will not be considered in Cybersecurity threat Intrusion Phases ?


Alliance

Which of the following would most likely not be a symptom of a virus?


The CD–ROM stops functioning

________ are often delivered to a PC through an email attachment and are often
designed to do harm.
Virus

At Tactical level threat intelligence research analysis and reports can be


published after malware analysis.
False

which can't be used as a best practice for managing cyber threats ?


Artificial learning

Which is not part of a response follow-up activities?


Take appropriate pre-approved or required actions

A TCS business operations team required to meet 98% SLA in FY 2017'18 to avoid non-
compliance penalty which must be a part of
Architecture Controls is wrong

Cryptography, a word with Greek origins, means


Secret Writing

Which of the following is an independent malicious program that does not need any
host program?
Worm

In asymmetric key cryptography, the private key is kept by


Receiver

It is a program or hardware device that filters the information coming through an


internet connection to a network or computer system.
Firewall

In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt


actual messages, it is very slow if the message is __________.
Long

At Operational level threat intelligence real time feed protocols are being used.
True

Which is not a characteristics of Advanced Persistent threats ?


Full-automated

--------------------------------------not sure----------------------------

Defining five levels of SLA security controls each from 98.9 to 98.5 respectively
to control penalty risk must be a part of
Architecture Controls is wrong ,Architecture Monitoring ,Architecture Requirements
Traffic in a VPN is not ________
Invisible from public networks

Which helps to determine the effective security controls and measurement techniques
?
Threat Modelling

A Hacker or disgruntled employee who is interested in specific Asset or information


is a type of
Specific threat

Which helps to prevent the cyber-attacks using various security related tools,
policies, best practices and guidelines ?
Threat Assessment

In cryptography, what is cipher?


All the options

Which is not part of a Incident Response Preparation phase ?


Conduct a critical assessment of your organization. is wrong ,
Consider the implication of people, process, technology and information

A ________ is a credit card sized card with an embedded chip, containing


information about the user
Credit Card is wrong ans

At Strategic level threat intelligence information can be exchanged within it's


operating community
False

Which helps to predict the cybersecurity potential risks effectively ?


Proactive hunting

Attack which happens due to neglected factors like compromising with security is a
type of
Specific threat

They Keys used in Cryptography are __________


Single Round

Which of these groups exploits cyber vulnerabilities?


All

Which is not part of a threat Modelling process ?


Survey the Application is wrong

Cybersecurity threat is a scenario which will try to exploit possible


vulnerabilities to enhance security
True
The relationship between a character in the plaintext to a character is
One-to-many relationship

A Botmaster can attack and take control of vulnerable one like


All

Which helps to predict the cybersecurity potential risks effectively ?


Threat Modelling

Cyber security architecture is all about understanding one's Business Scope and
requirements only.
true

You might also like