CSCUv2 Exam Question
CSCUv2 Exam Question
To have
continuity of business practice, it is imperative that all the branch offices be able to communicate
amongst themselves.
Which of the following network systems would be suitable for data communication between the
employees of all branches of InfraTech Inc.?
• Ethernet
Duke is taking some of the best pictures he has yet as an amateur photographer in a pen drive to get
his work assessed by an expert. On the subway an unknown person picks his pocket. Along with his
wallet Duke also lost the pen drive with his pictures. Since he had not made any more copies of those
pictures, he lost them forever.
• Malware attack
• Hardware theft
• Software theft
• Natural disaster
Sarah has recently rented a small room on ABC Street, and started a business with seven employees.
She provided every employee with a computer and a common printer which is meant to be shared by
everyone.
Since we will be updating our customer database shortly, you are kindly requested to send the
following information.
• Name
• Bank login id
• Password
• Branch
• Date of birth
• Alternate email
Please contact the ABC Bank customer team in case of any queries. Thank you for your cooperation.
• Phishing
• Spy-phishing
• Nigerian scam
• Body
• Footer
• Signature
• Header
Lucy, a 55 year-old woman, was not a technically savvy person. She did not install or enable any
applications on her computer, and only used it for looking up recipes and knitting patterns. After
some time, Lucy’s computer started giving her problems. It often displayed the Blue Screen of Death
(BSOD) and unwanted windows kept popping up whenever she went online. When a computer
technician checked Lucy’s computer, it was discovered that her computer was infected with malware.
Which inbuilt Windows software should Lucy have enabled to prevent malware infection in her
computer?
• Task manager
• Jump lists
• Windows Defender
Ellie, an 18 year-old student, shares her Windows 8 computer with her younger brother, Adam. Adam
is very mischievous and whenever he is on the computer, he ruins Ellie’s college assignments. Ellie,
who is fed up of this decides to encrypt the drive that contains her assignments. She uses inbuilt
Windows software to encrypt the drive so that Adam cannot access the drive.
• SPAMfighter
• BitLocker
• Adobe
• Skype
Luke works as an analyst for AS Pvt. Ltd. His job there is to analyze statistics and records obtained
from people to improve the sales of the company. However, recently the statistics and records given
to him have been incorrect, thus leading to gross miscalculations and wrong predictions on his part.
Which of the terms listed below, best describes these statistics and records that are incorrect?
• Data
• Information
• Indicators
• Archives
Which of the following terms refers to a collection of information that defines or describes the user
and his or her interests?
• Timeline
• Facebook group
• Profile
• Account settings
Harry, a 21 year-old college-going student, was working on his dissertation when suddenly a message
flashed on his screen, “All files on your computer have been encrypted. You must pay $1000 within 72
hours to regain access to your data.”Even after Harry paid the money, he was not able to access his
data, and all the documents on his dissertation were lost.
• Botnet
• Virus
• Ransomware
• Adware
Which of the following is an encryption program in Mac that helps users to protect their data?
• Lockbin
• Safari
• FileVault
• SPAMfighter
Susan, a 15-year-old girl, loves spending her free time baking and cycling. However, recently she has
been spending all of her free time glued to the computer. She shows no interest in her hobbies
anymore and looks depressed most of the time. Her parents also noticed that whenever they enter
her room, she quickly changes the computer screen. Understandably, Susan’s parents are worried
about her.
• Unsolicited emails
• Social engineering
Which of the following software programs allows you to access and display web pages on your
computer?
• Web browsers
• Search engine
• Extensions
• Email
Which privacy issue of clouds exposes users to the risk of their data being accessed by the cloud
service provider without the user’s consent?
• Data migration
• Data ownership
• Data permanency
• Data location
Harold, an associate at AQ Corporation, received a phone call from a person claiming to be Bob from
the IT department. Bob told Harold that he had noticed that Harold’s computer was running slow, and
could help him fix it. Harold, not having much knowledge regarding computers, readily agreed.
Following Bob’s instructions, Harold typed in some commands on his computer, and gave remote
access to Bob to have his computer fixed. Later on, Harold noticed that confidential information
concerning his clients was missing from his computer.
• Bluesnarfing
• Evil twin
• War driver
• Social engineering
Isaac is transferring all the data from his computer to an external drive as he wants to format his
laptop. While moving the data, he accidentally hits delete instead of cut on one of the files and
without realizing, hit the enter key when the computer prompted to confirm his action. As the file was
a huge one, it did not go to the recycle bin and got permanently deleted.
• Hardware theft
• Software failure
• Human error
• Computer virus
ABC Info Ltd. has a part of its business already on a cloud computing platform. However, its new
product suite would need a cloud service which runs on a totally different technology. The company
should be able to make its legacy products and new products communicate with each other as the
new products are just an upgrade of the old ones and much of the required data still resides on the
old cloud.
Which of the following cloud computing platforms will be suitable for ABC Info’s future needs?
• Public cloud
• Community cloud
• Hybrid cloud
• Private cloud
Certain software applications add or modify a particular feature in a browser. A few versions allow
users to block ads, watch online videos, or IM with friends.
• Extensions
• ActiveX
• Java
• Cookies
• Norton
• Avast Pro
• Kaspersky
• SPAMfighter
Andrew lost his iPhone on the way home from college. He anxiously wanted to recover it, as it was a
gift from his late grandfather. The iPhone also contained pictures that he had taken for a national
photography contest.
• SIM lock
• System updates
• iCloud backup
• Find my iPhone
Which of the following terms refers to the process of protecting information, and the infrastructure
that stores it?
• Availability
• Data security
• Keystroke logging
• Maintenance
Tom, a 14 year-old boy has been chatting online with Adam, whom Tom assumes is 14 years old as
well. Over the months, they built up a great ‘online’ friendship, playing online games, checking out
EDM websites, continuing with their friendly rivalry over football, and just talking about ‘guy’ stuff.
When Adam invited Tom over to meet him, Tom was obviously excited. However, when Tom met
Adam, he was shocked, as Adam turned out to be a 35 years old man. Despite this shock, Tom entered
Adam’s house, as he trusted him. Tom was having a great time playing PS3 with Adam, until the time
Adam touched him inappropriately. Tom ran away from Adam’s house and did not know what to do.
• Grooming
• Social engineering
• Phishing
• Pornography
A new online service allows people living with roommates to feed in all their house hold expenses in
its ‘share calculator’ program. The program then calculates how much each person is supposed to pay
and sends a detailed report to all those who are listed as roommates for that particular transaction.
• Platform as a Service
• Infrastructure as a Service
• Software as a Service
• Network as a Service
Ruth Cole is a sales manager and travels extensively on business. She regularly updates and stores
clients’ data on a remote data storage device via the Internet, so that in case she loses her laptop or it
crashes for some reason, she does not lose the data which is essential to carrying out her work.
Which type of data backup is Emma using to carry out her daily work?
• Incremental backup
• Differential backup
Fred, a 14 year-old boy, is an only child. Fred loves spending time on his Mac OS X browsing the
internet. When his parents are not at home, he spends hours at a stretch on the computer. Once,
when Fred’s parents come home late from work and find him on the Mac, they decided to limit his
computer time. Enabling an inbuilt feature in the Mac, Fred’s parents limit his computer time to two
hours daily.Which MAC OS X feature did Fred’s parents enable?
• Jump lists
• Parental control
• FileVault
• Time Machine
• App Store
• Extensions
• Internet Accounts
Imagine getting a letter from the Inland Revenue Authority of Singapore (IRAS) demanding that you
pay $5,700 in taxes. This is what happened to Rick. He received a letter informing him that he owed
the government unpaid income tax on wages he never earned. The IRAS letter said that Rick had
worked at several places. However, Rick is only 15 years old and his only job was working at his
uncle’s grocery store during the summer. He had never even visited some of the places where the
letter said he worked. Rick was not sure what to do next. After all, he has never even had a “real”
job like those listed in the letter.
• Social engineering
• Nigerian scam
• Phishing
• Identity Theft
Which of the following antivirus techniques refers to the process of comparing the current state of
stored programs to a previously recorded state, which is known to be free of malware?
• Heuristics analysis
• Integrity checking
• Bookmarks method
• Scanning
XYZ Infra Solutions, a startup company is looking for a cloud service provider who can provide virtual
machines, virtual local area network, customized software applications, on demand storage, IP
addresses, and firewalls to meet its business needs.
Which of the following cloud computing services can meet the business needs of the company?
• Software as a Service
• Platform as a Service
• Application as a Service
• Infrastructure as a Service
Hermione is a 21 year-old college student. She loves spending time on Facebook. However, with her
final exams approaching, she feels that spending time on Facebook will harm her exam results. Hence,
she enables a particular Facebook feature, with the help of which, she will not get any emails or
notifications from Facebook.
• Login alerts
• Deactivate account
A newly established ITES company plans to launch a website which enables its users to share pictures
and videos with each other. Apart from this, users can also comment on these pictures and share
them further.
Under which of the following cloud categories will the company’s product come?
• Public Cloud
• Private Cloud
• Community cloud
• Hybrid Cloud
• Pa#72tLe
• Domike*
• Donna1992
• donnamike92
John is an 18 year-old college-going student. He loves to read books and listen to music on his laptop.
He regularly downloads e-books and music from the internet. Lately, whenever John has been
spending time on his laptop, the laptop begins displaying the infamous Blue Screen of Death (BSOD).
Upon taking his laptop to the service center, John was told that his laptop was infected with malware.
• Slow system
• Unexpected crashes
Which of the following fundamental concepts of security refers to an action taken in advance to
protect the system against threats or dangers?
• Reaction
• Nonrepudiation
• Precaution
• Maintenance
Alex, the coach of Manchester United, called up Wayne, the captain of the team, to discuss the tactics
they would employ in the upcoming Champions League Final. The following day, Alex received an
email with the transcript of the conversation he had with Wayne. The sender of the email threatened
to make Alex’s tactics public, if he did not pay him $5000.
• Eavesdropping
• Phishing
• Social engineering
• android.com/devicemanager
• http://www.symbianguru.com/tracking-mobile-with-phone-guardian.html
• account.microsoft.com/devices
• iCloud.com
Janine’s parents gave her a smartphone for her birthday. The phone’s operating system intrigued and
delighted Janine at the same time. This was because it was the first time she had seen a smartphone
that had a tile-based setup. In addition, the tiles could be removed and interchanged on the home
screen.
• Windows
• Symbian
• Android
• iOS
Horace is a 64 year-old man who worked as an accountant for SN Associates before his retirement.
The company gifted him a laptop at the time of his retirement. Since Horace was not a technically
savvy person, he did not install any applications on his laptop, and only used it for checking his email
and playing poker online. After some time, Horace’s laptop started giving him problems. It crashed
frequently, often displayed the Blue Screen of Death (BSOD), and unwanted windows kept popping up
whenever he went online. When Horace took his laptop to the service center, he was told that his
laptop was infected with malware.
Which software should Horace have installed to prevent malware infection in his laptop?
• Adobe Reader
• One Drive
• Antivirus software
• Skype
Raymond received an email from an official claiming to be from his bank. The email requested
Raymond to send his personal details since the customer database of the bank was being updated.
Upon confirmation from the bank, Raymond was told that the bank had not sent any emails asking for
the personal details of their customers.
Which cyber-attack would Raymond have been a victim of if he had replied to the email?
• War driver
• Phishing
• Eavesdropping
Amy received an email from an official claiming to be from ABC Parcel Services. The email asked her to
collect a gift parcel sent by her friend three weeks ago. The service claimed that they were unable to
deliver the parcel to Amy, as the address provided was wrong. The service asked her to print out the
attached invoice copy, fill it, and collect the package from the branch office located in her city.
Which type of email security threat could Amy have faced, if she clicked or downloaded the
attachment?
• Hoax mail
• Phishing
Which of the following terms refers to software that attackers create to install on a victim’s computer
in order to compromise its security?
• Bitlocker
• Lockbin
• Dropbox
• Malware
Which of the following refers to the periodic patching of system files to fix any issues in the previous
version of the Windows OS?
• FileVault
• Windows Firewall
• Windows Updates
• Task manager
Sam uses his work laptop to watch pirated movies at home sometimes. When he tried to watch the
latest movie he downloaded, the movie file did not play even after trying on several different players.
Within a day of this, Sam noticed that many of his files were vanishing one after the other from his
laptop even though neither he nor anyone else deleted them. The network administrator of his
company, after taking a look at his computer told him that the movie files, which did not play,
definitely had something to do with this peculiar behavior.
• Human error
• Natural disaster
• Computer virus
• Software failure
Which of the following terms refers to malicious software that is specifically built to target mobile
phones and smartphones systems?
• Mobile malware
• Unmanaged applications
• Broken cryptography
• Phishing
Susan downloaded a software from the Internet and installed it on her computer for watching movies
online. After installing the software, she noticed that her PC was slowing down and was taking more
time to open webpages.
• Integrity checking
• Heuristics analysis
• Scanning
• Bookmarks method
Which of the following terms refers to the process that ensures accuracy of the sender and receiver of
a message?
• Nonrepudiation
• Data
• Authenticity
• AvailabilitY
As part of his security implementation plan, Glenn was updating his firewall. Which aspect of the
security implementation plan was Glenn working on?
• Precaution
• Nonrepudiation
• Reaction
• Maintenance
Samuel, a network admin in an IT firm, has just discovered a phishing site known for targeting
corporate entities. Several employees have received emails with the domain name, which is the same
as that of this site. In order to prevent the company’s network from being corrupted, Samuel decides
to block all incoming and outgoing traffic from that site.
Which of the following defense mechanisms can Samuel use to implement this?
• Virus
• Firewall
• Disk encryption
• Encryption