Test Cscu: Answers

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

TEST CSCU

1) The installation of an antivirus refers to which step of the security


implementation
a) Reaction
b) Precaution
c) Maintenance
Answers
2) What is a zombie machine?
a) a machine that executes the instructions of another machine
b) a machine that has the symptoms of malware infection.
c) a machine on which a zombie game is played
Answers
3) The process that accurately ensures that the sender of a message is who
he claims to be is called:
a) Non-repudiation
b) Confidentiality
c) Authenticity
Answers
4) The system flaws that could not be fixed are:
a) vulnerabilities
b) threats
c) zero days
Answers
5) A malicious program that allows you to open a port on a machine is
called:
a) a worm
b) a rootkit
c) a backdoor
Answers
6) A program that looks good but hides a lot of malware in it is:
a) virus
b) trojan
c) spyware
Answers
7) What are the threats related to phones?
a) bluesnarfing
b) phishing
c) Grooming
d) Eavesdropping
Answers
8) Total virus is a tool for analysis:
a) systems
b) links
c) attachments
Answers
9) The technique of modifying the source code of a site before putting it
back on the Internet is called:
a) Reverse engineering
b) Phishing
c) Spoofing
Answers
10) To secure an operating system, it is recommended to:
a) Disable the guest account
b) Use a standard account
c) Privilege escalation
Answers
11) A secure site can be recognized from:
a) padlock, green bar and Https
b) Https Everywhere
c) Malwarebytes
Answers
12) Associate each protocol with its port
a) SMTP
b) 80
c) 25
d) HTTPS
e) 23
f) 443
g) Telnet
h) http
Answers
13) Sending unwanted messages is called
a) spamming
b) e-mail
c) cookies
Answers
14) What is the certificate that HTTPS sites use
a) SSL
b) SMTP
c) SQL
Answers
15) What is a cookie?
a) it is spyware
b) it is a small cake
c) it is a program that records the user's preferences
Answers
16) The art of convincing a person to obtain their personal information is:
a) Keylogger
b) Social engineering
c) Ransomware
Answers
17) The attack which consists in intercepting, stealing and modifying the
information of a mobile communication is called :
a) Bluesnarfing
b) Man In The Middle
c) Eavesdropping
Answers
18) To encrypt her keyboard entries, Maria must install:
a) Keyscramble
b) Keylogger
c) Keystroke
Answers
19) an information is:
a) a data
b) a publication
c) data that has meaning
Answers
20) The part of the email that contains the source address, destination
address, subject, location, time, ip address is called:
a) Header
b) Body
c) Signature
Answers
21) The tool that allows you to block spam is:
a) Spamfighter
b) Lockbin
c) Tor
Answers
22) The type of encryption that allows you to use a public key and a private
key is:
a) Symmetric encryption
b) Robust encryption
c) Asymmetric encryption
Answers
23) To secure your email account, it is recommended to configure:
a) double authentication
b) antivirus software
c) metadata
Answers
24) To keep children safe on the Internet, we must:
a) configure the parental control
b) prohibit a child from using the Internet
c) install a child navigator
Answers
25) The command that allows to see the open ports is:
a) Ping
b) Ipconfig
c) Netstat
Answers

You might also like