0% found this document useful (0 votes)
323 views6 pages

Exam Training 3

This document contains 45 multiple choice questions about cybersecurity concepts such as malware, passwords, firewalls, patching, and encryption. The key topics covered include identifying Trojans, restricting websites, the importance of personal firewalls and antivirus software, best practices for password management, login authentication methods, defining threats and vulnerabilities, the Windows registry database, strong password requirements, SSL activation, common online risks, macro security settings, proper patch management, social engineering attacks, private folders, asymmetric encryption, email security, cookies, guest account usage, event types, ongoing security processes, using the Event Viewer, denial of service attacks, handling suspicious calls, locking workstations, verifying secure websites, wireless network SSIDs, file sharing security

Uploaded by

adrian kelvianto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
323 views6 pages

Exam Training 3

This document contains 45 multiple choice questions about cybersecurity concepts such as malware, passwords, firewalls, patching, and encryption. The key topics covered include identifying Trojans, restricting websites, the importance of personal firewalls and antivirus software, best practices for password management, login authentication methods, defining threats and vulnerabilities, the Windows registry database, strong password requirements, SSL activation, common online risks, macro security settings, proper patch management, social engineering attacks, private folders, asymmetric encryption, email security, cookies, guest account usage, event types, ongoing security processes, using the Event Viewer, denial of service attacks, handling suspicious calls, locking workstations, verifying secure websites, wireless network SSIDs, file sharing security

Uploaded by

adrian kelvianto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 6

1) Trojans Are otherwise known as.

a) Backdoors
b) Troy
c) Virus
d) worm
2) To restrict visiting Internet sites,you can modify the setting of your
a) Operating system
b) ISP
c) Web browser
d) Modem
3) choose the correct statement from the following.
a) A personal firewall protects system fromInternwt attacks to a certain extent
b) An antivirus eliminates the need for a firewall
c) A personal firewall will check all email attachments for malware
d) An Antivirus is not needed when a firewall filters all ports
4) which of the following statements is wrong regarding good password management?
a) Do not share your password
b) Do not write down your passwords
c) Do not use easily guessable password
d) Do not change password frequenty
5) When you login to your computer,you
a) Identify and authentication
b) Identify and authorize
c) Authenticate and validate
d) Authentication and reinforce
6) choose the correct statement
a) Threat is a potentail violation of security
b) Threat is a defined way to brech security through a vulneabily
c) Threat is the existence of weakness or implementaion error
d) Threat is an assault on system security
7) is database thate stores all installation information of windows os
a) Event Viewer
b) Registy
c) Logs
d) Accsess
8) A stong password will be a combination of
a) Letters only
b) Numbers only
c) Letters in caps and small forms
d) Letters,numbers and special characters
9) Which of he following would you consider as a good password?
a) Beatle Juices
b) Lms#456JKZX8
c) 13Locksmith
d) JamesBrown
10) What is Regedit32.exe?
a) Regidit editor
b) Registred edito for 32 bit system
c) Registred editor for windows
d) Registred event viewer
11) How would you active SSL on your system?
a) Download a SSL certificate from a secure server
b) There is a need to do anything to active SSL
c) Use the SSL extension in your URL(https)
d) Register with a security provide such as version
12) What are the three most common risk associated with “surfing the Web”(selec t 3 answer)
a) Theft of credit card information
b) Theft of personal identify and other private information
c) Overloading computer system resources
d) Contamination by a virus or other malicious code
13) Highest macro security is used in by defaults in MS OFFICE application
a) Accsess
b) Word
c) Powepoint
d) Excel
14) Which statement is correct with regad to path management?
a) Patches are occasionally sent over email
b) Patches should be download only from the vendor site
c) Not applying application patches cannot lead to system comproms.
d) Only operating system patches need to be applied
15) Name the attack whee a person is tricked into disclosing information
a) Backdoors
b) Keylogging
c) Time bomb
d) Social Engineering
16) A ‘Private’ folder in windows xp is
a) A folder that is not shared
b) A private shared folder
c) An encrypted folder
d) A hidden folder
17) In asymmetric encryption
a) Similar key are used
b) Two public keys are used
c) Two privatee keys are used
d) A public and private key is use
18) Which of the following option would you choose to secure e-mail messages?
a) Digital signature
b) Digital voice
c) Digital autograph
d) Digital photograph
19) What is a ‘cookies’?(select 2 answer)
a) A cookie is a dynamic link library loded when windows start
b) A cookie is a file encryption utility
c) A cookie is spyware program
d) A cookie is a file created by an Internet site to store information on your computer
20) A guest account should be
a) Given executable rights
b) Used for administrator alone
c) Preferably disabled
d) Created as a separate login
21) Events are of two types namely and events.
a) Application and Execution
b) Application and log
c) Application and security
d) Execution and security
22) Security is a
a) A snapshot of a system in time
b) One time initative
c) On going procees
d) Theoretical concept
23) Event viewer is used for
a) Viewing web events in real time
b) Viewing system log of events
c) Viewing progress of events
d) Viewing mail analysis of events
24) choose the correct statement
a) The skill level needed to conduct an exploit has decreased
b) Evolution of technology did little to increase ease of use
c) Security is only a one stage process
d) Software flaws can be absolutely eliminated
25) Denial of service occurs when
a) Illegitimate users are prevented from using resources
b) Legitimate users are denied access to resources
c) ISPS notify a down time to users
d) An organization denies access to certain sites
26) What should you do if you receive a call from someone in your computer support department
asking for your password?
a) Give it to them without question
b) Inform them that there is no reason they should need your password and refuse to give it to
them
c) Ask them why they need the password.If the reason sounds legitimate,go a head and give
d) Send the password via e-mail to ensure you’re giving it to the right person
27) Working away from the office gives you are more freedom to disregard .your company’s security
standards and policies.(True or False)
a) True
b) False
28) Which key combination in windows will lock your workstation?
a) Ctrl+shift+del
b) [windows key]+L
c) Alt+shift+Del
d) Alt+shift+ctrl
29) To verify if your are on a secure page,you will check for
a) http:// in the url and padlock sign on the page
b) http:// in the url and padelock sign on the page
c) http:// in the url and handlock sign on the page
d) https:// in the url and handlock sign on the page
30) SSID is the
a) Application of SSL in a wireless LAN
b) Name of a wireless local area Network
c) Secure ID given to an individual browsing on a wireless LAN
d) Encryption off data over radio waves to avoid interception
31) While using peer network which of the following precautions would you use?
a) Use a reliable client software
b) You can safely transmit password in pqp network
c) Share files and folder selectively
d) Scan all downloaded file using av software
32) Which option will you choose to share file more security?
a) FTP sites
b) HTTPS sites
c) Share you root drive
d) PQP network
33) This tool can capture password when types from the keyboard
a) Eavesdropper
b) Keylocker
c) Enterapper
d) Keylogger
34) Computer virues are most commonly spread by?
a) Choosing weak computer passwords
b) Opening e-mail attachmens
c) Downloading pictures from web
d) Reading jokes on the Internet
35) What is a Zombie Machine
a) A machine that is dependant on othor machine for resources
b) A machine that accespt and acts on instruction from athor machine
c) A machine that does not respond to any instruction
d) A machine that does not have a hard drive
36) Which of the following statements are wrong in the contex of “downloading”files?
a) It is safe to open a file or run a program directly from a location
b) Never save the file in the root directory of the computer
c) Before opening the file,save all other work and close other programs
d) Files must be scanned for viruses/Malware prior to using them
37) Which of the following is the best example of a strong password?
a) Pa44word(a word thatsubtitutes numbers for some of the letters
b) pateR%office3 (a name or phrase that mixes uppercase and lowercase letters,numbers and
symbols)
c) good2go(a phrase the mixes letters and numbers)
d) Dadl969(something easy to remember like a name and birth date)
38) What is an incident?
a) Misuse of computer rersources by runnig malicious codes
b) Gain unauthorized access to computer
c) An undesired event of violating the security of a computer
d) All of the above
39) Which service listens on port 25?
a) telnet
b) pop
c) FTP
d) SMTP
40) Services are programs that
a) Starts when MS OFFICE starts
b) Starts up when the system boot
c) Starts when an application is abruptly closed
d) Starts when the user connects to the internet
41) Which command displayes all.Current TCP/IP network configuration values?(select 2 answer)
a) IPconfig
b) Netstat
c) Ping
d) Netconfig
42) While using peer to peer networks which of the following precautions whould you use??
a) You can safuly transmit password in PQP network
b) Scan all downloaded file using AV software
c) Use a reliable client software
d) Share files and folder selecting
43) when youlogin to your computer,you
a) Identify and authenticate
b) Identify and authorize
c) Authenticate and validate
d) Authenticate and reinforce
44) Which statement is correct with regard to patch management?
a) Not applying application patching cannot lead to system compromble
b) Only operating system patches need to be applied
c) Patches should be downloaded only from the vendor site
d) Patches are occasionally sent ove e-mail
45) Which of the following statements are false?
a) Encryption involves protecting a file by hiding them into an anthore file or message so that only
authorized users can access the file
b) Authenticity of all files downloaded from third party sources cannot be trusted
c) File integrity can be checked by using MD5 check sum
d) All application can be identified by using a task manager
46) choose the correct statement from the following
a) A person firewall will check all e mail attachment for malware
b) An antivirus eliminates the need for a firwall
c) An antivirus is not neede when a firwall filters all port
d) A personal firewall protects system from Internet attacks to a certain extens
47) The folder in windows registry editor is called and the content called
a) Keys,notes
b) Keys,values
c) Values,key
d) Notes ,value
48) The three types of registry values are called
a) Dword,Numberical and Ascil
b) Binary,Dword,Ascial
c) String,Binary,Dword
d) String,Numberical and Binary
49) The default port on which HTTP listens is
a) 23
b) 80
c) 110
d) 130
50) If you had secure a folder completely,which option will you choose?
a) Rename the folder
b) Hide the folder
c) Zip the folder
d) Encrypt the folder
51) While using peer to peer networks.which of the following precatons would you use?
a) You can safely transmit passwords in PQP networks.
b) Scan all downloaded files using AV software
c) Use a reliable client software
d) Share files and folder selection

You might also like