0% found this document useful (0 votes)
1K views6 pages

Cybersecurity Prologue

This document contains 73 questions related to cybersecurity concepts. The questions cover topics such as symmetric and asymmetric key cryptography, VPNs, firewalls, malware types like viruses and ransomware, cyber ethics, threat modeling, incident response processes, user entity and behavior analytics, data privacy, cryptography keys, password best practices, and threat intelligence sharing alliances.

Uploaded by

kashyap
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views6 pages

Cybersecurity Prologue

This document contains 73 questions related to cybersecurity concepts. The questions cover topics such as symmetric and asymmetric key cryptography, VPNs, firewalls, malware types like viruses and ransomware, cyber ethics, threat modeling, incident response processes, user entity and behavior analytics, data privacy, cryptography keys, password best practices, and threat intelligence sharing alliances.

Uploaded by

kashyap
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 6

S.

No
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
Questions
In Symmetric-key cryptography, the key used by the sender and the receiver is
UML component diagram is used to identify how a module validate and processes the data before storing it.
How do we define RADIUS?
Which helps to determine the effective security controls and measurement techniques
The altering of data so that it is not usable unless the changes are undone is
It is a program or hardware device that filters the information coming through an internet connection to a netw
At Tactical level threat intelligence research analysis and reports can be published after malware analysis
A ________ is an extension of an enterprise’s private intranet across a public Network such as the Internet across
secure private connection.
Which helps to predict the cybersecurity potential risks effectively ?
The relationship between a character in the plaintext to a character is
In asymmetric key cryptography, the private key is kept by
Which of the following would most likely not be a symptom of a virus?
WPA2 is used for security in ________
Traffic in a VPN is not
________ are often delivered to a PC through an email attachment and are often designed to do harm.
A type of malware that demands a ransom if the victim wants his or her files back is called ________
Exploring appropriate and ethical behaviors related to online environments and digital media
Which of these groups exploits cyber vulnerabilities?
Which is not part of a response follow-up activities?
Which is not part of a threat Modelling process ?
What is PUP?
 monitors user activity on internet and transmit that information in the background to someone else
Unsolicited commercial email is known as _
Internet can impose a number of Risks and hence Cybersecurity is required -
A ________ is like a Virus, having the ability to spread without any medium -
Which of these are Personally Identifiable Information?
Which of these is an anti-virus program
 The sole purpose of ________ attack, is to fool the victim and to get all the confidential information
If there is a vulnerability but no threat, then there won't be a risk
Risk represents
Cryptography, a word with Greek origins, means
The Cryptography can provide
Detection and Analysis is a continuous process of a cyber-attack for detecting Malware intrusion and their rem
Which is a part of a response phase activities ?
Incident Category can be defined according to business functional priorities
Incidents should be handled on a first come- first serve basis and must be prioritized based on the Bu
Which is not part of a Incident Response Preparation phase ?
Which is not a set of activity performed to prevent future incidents in Incident management ?
Deep packet inspection can be used to give more context to indicator only
A ________ is a credit card sized card with an embedded chip, containing information about the user
Which of these are Threats related to Email Security?
Phishing emails include fake notifications from banks and e-payment systems
Which of these are examples biometrics?
Which of these is TRUE with respect to passwords?
As an email client, we should not use caution when opening emails and can download any attachments
At Operational level threat intelligence real time feed protocols are being used
Cyber security architecture is all about understanding one's Business Scope and requirements only
Which of the following is not an antivirus software?
Network layer firewall works as a
The Cryptography can provide
are attempts by individuals to obtain confidential information from you to falsifying their identity
Attack which happens due to neglected factors like compromising with security is a type of
A Hacker or disgruntled employee who is interested in specific Asset or information is a type of
A TCS business operations team required to meet 98% SLA in FY 2017'18 to avoid non-compliance penalty wh
Defining the security control parameter SLA at 98.5% for taking appropriate actions to avoid penalty risk if it g
At Strategic level threat intelligence information can be exchanged within it's operating community
An attempt to make a computer resource unavailable to its intended users is called
UEBA stands for
________ is the guarantee of data privacy and protection against unauthorized disclosure.
Which is a open source data loss prevention solution.
They Keys used in Cryptography are
In symmetric-key cryptography, the same key is used by
which can't be used as a best practice for managing cyber threats ?
In cryptography, what is cipher?
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very
Which is not a characteristics of Advanced Persistent threats ?
Cybersecurity threat is a scenario which will try to exploit possible vulnerabilities to enhance security
Which helps to prevent the cyber-attacks using various security related tools, policies, best practices and guide
A Botmaster can attack and take control of vulnerable one like
Which observes the behavior of the malware in a sandbox-virtual environment to prevent the malware from a
Defining five levels of SLA security controls each from 98.9 to 98.5 respectively to control penalty risk must be
Which one will not be considered in Cybersecurity threat Intrusion Phases ?
Which of the following is an independent malicious program that does not need any host program?
Answers
Shared
0
Remote Authentication Dial-In User Service.
Threat Modelling
Encryption
Firewall
0
VPN
Threat Mitigation
Many-to-one relationship
Sender and Receiver
Existing program files and icons disappear
Wifi
Logically separated from other traffic
Virus
Ransomware
Cyber Ethics
All the options
Take appropriate pre-approved or required actions
Compose Applications
Potentially unwanted program
Spyware
Spam
True
Worm
All the options
All the options
Phishing
1
Threats times vulnerabilities
Secret Writing
All them
1
Take appropriate pre-approved or required actions
True
0
Create appropriate control framework
Mitigate
0
Smart Card
all
1
All the options
Passwords need to be atleast 8 chars of length
0
1
0
Code Red
Packet filter
all
Phishing scams
Non-Malicious threat
Malicious threat
Architecture Controls
Architecture Risks
TRUE
Denial-of-service attack
User Entity and Behavior Analytics
Confidentiality
MyDLP
Single Round
Both Party
Behavioral modeling
All the options
Long
Full automated
0

Threat Assessment
All the options

Dynamic Analysis
Architecture Controls
Alliance
Worm

You might also like