100% found this document useful (3 votes)
3K views5 pages

Certified Secure Computer User Exam Question Prepare

This document contains a 25 question multiple choice exam about computer security concepts. The questions cover topics like guest accounts, private folders, ports, SSIDs, social engineering attacks, event viewers, file sharing methods, passwords, malware, peer to peer networks, computer viruses, services, security as an ongoing process, network configuration commands, incidents, and restricting websites. The correct answers to each multiple choice question are also listed.

Uploaded by

kouassi joel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (3 votes)
3K views5 pages

Certified Secure Computer User Exam Question Prepare

This document contains a 25 question multiple choice exam about computer security concepts. The questions cover topics like guest accounts, private folders, ports, SSIDs, social engineering attacks, event viewers, file sharing methods, passwords, malware, peer to peer networks, computer viruses, services, security as an ongoing process, network configuration commands, incidents, and restricting websites. The correct answers to each multiple choice question are also listed.

Uploaded by

kouassi joel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

CSCU EXAM TEST

1- A guest account should be …………..

a- Preferably disabled
b- Created as a separate login
c- Given executable rights
d- Used for administration alone

2- A ‘private’ folder in Windows XP is …………..

a- A folder that is not shared


b- A hidden folder
c- An encrypted folder
d- A privately shared folder

3- The default port on which http listens is ………….

a- 23
b- 110
c- 139
d- 80

4- SSID is the …………….


a- Secure ID given to an individual browsing on a wireless LAN
b- Encryption of data over radio waves to avoid interception
c- Name of a wireless local area network
d- Application of SSL in a wireless LAN

5- Name the attack where a person is tricked into disclosing


information

a- Time Bomb
b- Backdoors
c- Keylogging
d- Social Engineering
CSCU EXAM TEST

6- Event viewer is used for ……………..

a- Viewing progress of events


b- Viewing web events in real time
c- Viewing mail analysis of events
d- Viewing system log of events

7- Which service listens on port 25?

a- POP
b- FTP
c- Telnet
d- SMTP
8- Which option will you choose to share files more securely?

a- HTTPS WebDAV folders


b- P2P networks
c- Share your root drive
d- FTP sites

9- Gareth's parents found him wathing porn on line on the Mac


they gave him on his birthday. They obviously do not want
Gareth to repeat this behavior. What action can Gareth's
parents take to ensure this?

a- Install anti-Virus
b- Use a parental Control
c- Install AdBlock

10 - Which of the following statements are wrong in the context of


“Downloading files“?
a- Never save the file in the root directory of the computer
b- Files must be scanned for viruses/Malware prior to using them
c- Before opening the file, save all other work and close other programs
d- It is safe to open a file or run a program directly from location
CSCU EXAM TEST

11- While using peer to peer networks which of the following


precautions would you use?

a- Scan all downloaded files using AV software


b- You can safely transmit passwords in P2P networks
c- Use a reliable client software
d- Share files and folders selectively

12- Trojans are otherwise known as


a- Backdoors
b- Virus
c- Worm
d- Troy

13- Which of the following would you consider as a good password?


a- Lms#456JkzX8
b- 13Locksmnith
c- Beetlejuice$
d- James Brown

14- This tool can capture passwords when typed from the keyboard
a- Eavesdropper
b- Keylocker
c- Entrapper
d- Key logger

15- Services are programs that ………………


a- Starts when an application is abruptly closed
b- Starts when MS office starts
c- Starts up when the system boots
d- Starts when the user connects to the Internet
CSCU EXAM TEST

16- Security is a …………


a- ongoing process
b- A snapshot of a system in time
c- one time initiative d- Theoretical concept

17- Working away from the office gives you more freedom to
disregard your Company’s security standards and policies. (True or False)
a- True
b- False

18- Computer viruses are most commonly spread by:


a- Opening e-mail attachments
b- Choosing weak computer passwords
c- Reading jokes on the Internet
d- Downloading picture from the web

19- Which of the following is the best example of a strong


password?
a- Dad1969 (something easy to remember like a name and birth date)
b- Pa44w0rd (a word that substitutes numbers for some of the letters)
c- Peter%0ffic3 (a name or phrase that mixes uppercase and lowercase
Letters, numbers and symbols)
d- Good2go (a phrase that mixes letters and numbers)

20- …………… is a database that stores all installation of Windows OS


a- Access
b- Event viewer
c- Logs
d- Registry
CSCU EXAM TEST

21- Choose the correct statement.


a- Threat is a potential violation of security
b- Threat is an assault on system security
c- Threat is the existence of weakness or implementation error
d- Threat is a defined way to breach security through a vulnerability

22- Which command displays all current TCP/IP network


configuration values? (Select 2 answers)
a- Ping
b- Netstat
c- Netcong
d- Ipconfig

23- What is an incident?


a- Misuse of computer resources by running malicious codes
b- Gain unauthorized access to computers
c- All of the above
d- An undesired event of violating the security of a computer

24- Which program executes when a certain condition is met?


a- Logic Bomb
b- Time Bomb
c- Worms

25- To restrict visiting Internet sites, you can modify the settings of
your ……
a- ISP
b- Modem
c- O.S
d- Web Browser

You might also like