0% found this document useful (0 votes)
1K views1 page

Cscu Exam

This document contains a student's name and student ID number, followed by 50 multiple choice questions related to cybersecurity topics. Some of the questions cover topics like encryption, malware, wireless hacking techniques, and compliance standards like HIPAA and PCI DSS.

Uploaded by

Elton Sancho
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views1 page

Cscu Exam

This document contains a student's name and student ID number, followed by 50 multiple choice questions related to cybersecurity topics. Some of the questions cover topics like encryption, malware, wireless hacking techniques, and compliance standards like HIPAA and PCI DSS.

Uploaded by

Elton Sancho
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Nama : Muhammad Yuwan Maulana

NIM : 201804018

26. a. You have an out of date browser, as indicated by the message. You will click protect
PC Now button.
27. a. Bob should encrypt it with his private key
28. c. Trojan
29. a. IMEI code
30. a. Refuse and report immediately
31. a. netstat -a
32. d. Bluesnarfing
33. a. HIPAA
34. d. Router
35. b. 512 -bit
36. b. Hider IP
37. b. VPN and Ipsec
38. b. Create a hidden share by adding a dollar sign ($) to the start of the share name
39. d. Both B & C
40. b. Using social engineering to extract information from the help desk executive
41. c. A – Registration Authority (RA), B – Certificate Authority (CA), C- Validation Authority
(VA)
42. a. Advanced Encryption System (AES)
43. b. convert D:/fs:ntfs
44. b. Skimming/counterfeit credit card
45. a. An attacker masquerading as a law enforcement authority to gain access to the
wireless network
46. c. In spamming, the user may receive threatening emails that contain false information,
insisting that he or she forwards the email
47. c. PCI DSS
48. a. Bluesniping
49. c. Protecting from losses due to identity theft
50. c. Denial of service

You might also like