0% found this document useful (0 votes)
440 views10 pages

Star Cyber Secure User

The document contains questions and answers related to cybersecurity topics such as malware, encryption, authentication, cloud computing, networking, and mobile device security. Some key topics covered include types of malware like ransomware and rootkits, encryption methods, cyberattacks like man-in-the-middle attacks, and cloud computing models like IaaS, PaaS, and SaaS. Networking concepts such as firewalls, VPNs, and wireless standards are also addressed. The document tests knowledge of both technical and non-technical aspects of cybersecurity.

Uploaded by

Krish Admin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
440 views10 pages

Star Cyber Secure User

The document contains questions and answers related to cybersecurity topics such as malware, encryption, authentication, cloud computing, networking, and mobile device security. Some key topics covered include types of malware like ransomware and rootkits, encryption methods, cyberattacks like man-in-the-middle attacks, and cloud computing models like IaaS, PaaS, and SaaS. Networking concepts such as firewalls, VPNs, and wireless standards are also addressed. The document tests knowledge of both technical and non-technical aspects of cybersecurity.

Uploaded by

Krish Admin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

SCSU

(Star Cyber Secure User)


1.What has led to the increase in cybercrime relate to mobile devices?
Ans: Introduction of mobile wallets
2.Which of the following does not belong to the elements of data security?
Ans: Validation
3.Ransomware and Rootkit are:
Ans: Malware
4.Which of the following is considered as one of the “first ever registered online
viruses”?
Ans: Morris Worm
5.Which of the following is not a mobile antivirus?
Ans: Python Protection
6.Out of the following, which is not the correct step to protect computer and the
data stored on them against natural threats?
Ans: Updating the operating system on a timely basis
7.Data can be generated in two ways:
Ans: Explicitly and Implicitly
8.Which of the following is not the correct method for identifying a secure
website?
Ans: Checking the name of the website
9.Which of them is not a category of computer networks?
Ans: SAN
10.Out of the following, which is a filter that removes spam mails?
Ans: Spamihilator
11.What is 'S' in HTTPS?
Ans: Secure
12.What does the term ‘evil twin’ refer to?
Ans: A wireless network access point that impersonates a legitimate wireless
access point
13.Encryption refers to:
Ans: The conversion of digital data to another form or code
14.What is ciphertext?
Ans: Encrypted Text

1|P ag e
15.What do you mean by Identity Theft?
Ans: Fraudulent practice of using the identity of another person
16.Out of the following methods, which one backs up only the changed files and
new files created since the last incremental or full backup?
Ans: Incremental Backup

17.What is the name of a built-in antivirus for Windows 10?


Ans: Windows Defender
18.What are Stealth Sites?
Ans: Sites made for routing users to the wrong and affected sites
19.Which of the following does not contribute in compromising the privacy of data
stored on cloud?
Ans: Technology Drawbacks
20.A network that connects all devices in your home to the Internet and to each
other is known as:
Ans: HAN
21._____ transaction refers to any transaction that uses electronic medium.
Ans: Digital
22.Which of the following data backup method utilises maximum storage space?
Ans: Full backup
23.What is Firefox?
Ans: An open source web browser
24.Which of the following is not an alias for Clickjacking?
Ans: Cursorjacking
25.By default, how many sign-in attempts Windows allow for user accounts?
Ans: Unlimited
26.2A collaborative effort in which storage is shared between several companies
having common concerns, such as security, compliance and jurisdiction is known
as:
Ans: Community Cloud
27.Which of the following is not a mobile operating system?
Ans: Linux
28.The act of monitoring user communication without consent is called:
Ans: Eavesdropping
29.Which of the following cloud service is designed for developers to build, run
and manage applications over the Internet?
Ans: PaaS

2|P ag e
30.What is Diffie-Hellman?
Ans: Asymmetric encryption algorithm
31.The feature under which each time you log in to your account, the system
sends a one-time password on your registered mobile number is known as:
Ans: Two Step Authentication
32.Which of the following is not a Malware?
Ans: Spam
33.The two most commonly used methods for securing data are:
Ans: Encryption & Authentication
34.Which of the following is not an email service provider?
Ans: Whatsapp
35.The use of methods and practices to secure the data and other information
stored on the mobile devices, such as smartphones and tablets is known as:
Ans: Mobile Device Security
36.The process that involves software based data erasure is known as:
Ans: Data Wiping
37.In the context of e-wallet, what does NFC stands for?
Ans: Near Field Communication
38.What type of network allows computers or an entire network to connect to
each other over the Internet securely?
Ans: VPN
39.How can users secure their devices from hacker attacks on iOS devices?
Ans: By enabling the passcode and Auto-Lock features
40.DDoS stands for:
Ans: A Distributed Denial of Service
41.A ________ network connects devices to the Internet or other networks using
cables.
Ans: Wired
42.Wi-Fi is a type of _______
Ans: WLAN
43.The first computer network was built in the year 1969 and it was known as:
Ans: Advanced Research Projects Agency Network (ARPANET)
44.The main function of private browsing is to:
Ans: Delete cookies, temporary Internet files and browsing history after you close
45.the browser window.
Which of the following is not an encryption method for wireless settings?
Ans: Wireless Encryption Application (WEA)

3|P ag e
46.Data destruction refers to:
Ans: The process of destroying data stored on various electronic storage media
47.Unsolicited Bulk Email (UBE) is another name for:
Ans: Spams

48.Which of the following is a type of Clickjacking?


Ans: Likejacking
49.A network in a campus is usually a ___________
Ans: MAN
50.You can upgrade firewalls with _____
Ans: ACLs
51.Safari is a web browser based on the _______ engine.
Ans: WebKit
52.In computer networking, what does DMZ stands for?
Ans: Demilitarised Zone
53.What is URL Spoofing?
Ans: The act of misleading a user to different website by sending a legitimate
looking URL
54.The method of adding geographical metadata to various media such as images,
videos, websites, SMS messages, QR codes or smartphone transmissions is known
as:
Ans: Geotagging
55.Data security is also called:
Ans: Information Security (IS)
56.What is Clickjacking?
Ans: The attempt to hide malicious programs in the garb of legitimate buttons or
links
57.Which of the following is an additional layer of security to your LinkedIn
account?
Ans: Two-step verification
58.Which of the following are the two types of network security threats?
Ans: Passive and Active
59.The unauthorised access of data through an open and insecure Bluetooth
connection by a wireless device is known as:
Ans: Bluesnarfing
60.In context of data, what is an information?
Ans: Interpreted, organised and structured data

4|P ag e
61.______ is a device or software that allows eavesdropping on traffic moving
between computers.
Ans: Packet Sniffer

62.Online data backup is also known as:


Ans: Cloud Storage
63.Apart from the Lock option, what other option can be used to lock your PC
when you want to leave your device for a little while?
Ans: Sleep
64.Which of the following is another name for a spam?
Ans: Unsolicited Commercial Email
65.When an untrusted device gains access to another mobile device via Bluetooth
to collect the data of the latter, this practice is known as:
Ans: Backdoor hacking
66.Searching for unsecured Wi-Fi networks by an individual in a moving vehicle,
using a computer and an 802.11 wireless LAN adapter is known as:
Ans: War Driving
67.Which type of digital wallets offer personal user accounts where a user can sign
up for an account and store credit or debit card information in it for faster
checkout?
Ans: Internet-based digital wallets
68.Which of the following in not the key function of operating system (OS)?
Ans: Undertake decisions based on previous activities and run on its own.
69.In Windows 10, Jump Lists feature refers to:
Ans: Lists that appear when the user right-clicks a taskbar icon
70.Which of the following is not an example of implicit data?
Ans: Saving phone numbers
71.Which of them is not a cloud service?
Ans: Application-as-a-Service (AaaS)
72.Out of the following, which cloud service offers virtual servers, storage disks
and networks?
Ans: IaaS
73.How many types of categories exist for digital wallets?
Ans: Two
74.IP Spoofing refers to:
Ans: the act of hiding the IP address to mislead the target computer to think that it
is receiving data from a trusted computer or host.

5|P ag e
75.What is a firewall?
Ans: A Software designed to block unauthorised access to a computer over a
network or the Internet
76.Which of the following is a web browser that is specially designed for kids to
show filtered results?
Ans: KidZui
77.Which of the following are not the benefits associated with computer
networks?
Ans: Distributed Software and Hardware Management
78.Data backup refers to the process of:
Ans: Copying important data to preserve it as an alternate
79.What does MITM stands for?
Ans: Man-In-The-Middle
80.Attacks that involve attempts by an intruder to monitor a communication for
stealing sensitive information that two devices transmit over a network is known
as:
Ans: Passive Threats
81.Which of the following is not a primary part of an email message?
Ans: Message Font
82.What is a built-in security feature of Windows OS that encrypts the hard drive
on your computer?
Ans: BitLocker Drive Encryption
83.What does PPTP stands for?
Ans: Point-to-Point Tunneling Protocol
84.In the context of file encryption tools, what does NTFS stands for?
Ans: New Technology File System
85.Digital signature helps in:
Ans: Authenticating the identity of the sender
86.How many types of architecture is involved in cloud implementation?
Ans: Four
87.A real-time intervention in the personal conversation of others over an
electronic medium is known as:
Ans: Eavesdropping
88.Network security is essentially required for:
Ans: All of the above

6|P ag e
89.Wide Area Network (WAN) refer to a network:
Ans: that spans over a large geographical area, such as a country or the entire
world

90.Use of wireless communication technology that facilitates transmission and


reception of transactions among devices without being connected physically is
known as:
Ans: Over-the-air communication
91.Public Key Infrastructure (PKI) based authentications are used to tackle:
Ans: Man-in-the-middle attack (MITM)
92.Employ Network Access Control (NAC) is used______
Ans: to authenticate every device before establishing any connection
93.Which of the following is not a cyberattack?
Ans: Google Hack
94.Data cannot be securely protected on a:
Ans: Network
95.Which of the following allows a connection over the air between two systems
to be encrypted, making the data unreadable to attackers?
Ans: SSL/TLS
96.PGP is a software used for protecting electronic mails. Its full form is:
Ans: Pretty Good Privacy
97.Which is the correct order of steps for implementing data security?
Ans: Precaution>> Maintenance >> Reaction
98.Which of following measures should not be applied to keep your cloud data
private:
Ans: Sharing of personal details for authentication
99.One of the guiding principles for protecting cyber assets is Confidentiality,
which means:
Ans: Securing your information so that only authorised users will be able to access
and view them.
100.Out of the following, which issues are irrelevant while examining and analysing
a cloud service:
Ans: Overall aesthetics of the interface
101.Snowshoe spamming refers to:
Ans: The practice of sending spam across multiple domains and IP addresses to
dodge filters

7|P ag e
102.___________ is a free and easy-to-use software that overwrites data on your
hard drive with random patterns.
Ans: Eraser

103.Which of the following option depicts two approaches of Social Engineering?


Ans: Direct and Indirect
104.WPA stands for:
Ans: Wi-Fi Protected Access
105.What is a snail mail?
Ans: Traditional Mail
106.Protecting your cyber assets involves three simple principles, and they are:
Ans: Confidentiality, Integrity and Availability
107.Which of the following options depict two types of encryption?
Ans: Symmetric and Asymmetric
108.In the context of hard drive encryption, what does TPM stands for?
Ans: Trusted Platform Module
109.The computer that is used to launch attacks on other computers is knows as:
Ans: Ans: Zombie Computer
110.Exchanging text messages between two or more participants in real time over
the internet using a set of communication technologies is called _______
Ans: Instant Messaging
111.What is a spoof mail?
Ans: A fake mail
112.In which year India suffered the largest data breach in the banking sector?
Ans: 2016
113.The main function of the web browser is to:
Ans: Access the information and resources from the World Wide Web
114.LongURL.org is used for:
Ans: For checking where the suspected link is destined without clicking on it
115.Which of them is not a data backup method?
Ans: Extensive backup
116.What is High Performance Radio LAN (HiperLAN)?
Ans: A Wireless LAN Standard
117.In which of the following attacks, legitimate users are deprived of access to a
network or a web resource?
Ans: DoS

8|P ag e
118.Which of the following is not SaaS?
Ans: Azure
119.Electronic Mail (email) was invented by whom?
Ans: Ray Tomlinson
120.IMEI stands for:
Ans: International Mobile Equipment Identity
121.Authentication is a method for:
Ans: Verifying identity for gaining legitimate access to the system or data.
122.What is the age limit for creating an account on Instagram?
Ans: at least 13 years old
123.Why Software updates are essentially important?
Ans: They help the computer to work smoothly without any glitches
124.Which of the following can help prevent botnets?
Ans: Network Intrusion Prevention System
125.Which of the following is not a digital wallet?
Ans: Quick Heal
126.Which of the following are not the primary elements of Internet security?
Ans: Application Security
127.Which of the following is not a function of e-wallet?
Ans: Provide alternative to cloud storage
128.Extensions are software that help in:
Ans: Addition or modification of a specific feature in a browser
129.What does TLS stand for?
Ans: Transport Layer Security
130.What does SMTP stand for?
Ans: Simple Mail Transfer Protocol
131.You can recharge or fund your e-wallet from various sources such as:
Ans: All of the above
132.Out of the following, what is not a digital asset?
Ans: Name Plates
133.Which of the following is not a cloud service?
Ans: McAffe Drive
134.In which of the following parts of a user account, the user describes
himself/herself?
Ans: Profile
135.GPS stands for?
Ans: Global Positioning System

9|P ag e
136.Which of the following does not result in the loss of data?
Ans: Uninstalling Web Browser
137.What do you mean by ‘cloud’ in cloud computing?
Ans: A metaphor for the Internet
138.Another name for a zombie computer is:
Ans: Bot
139.The term ‘cybersecurity’ was coined in which year?
Ans: 1988
140.What is SPAMfighter?
Ans: Anti-Spamming Tool
141.Which of the following is also known as ‘public key encryption’?
Ans: Asymmetric Encryption
142.The security of the OS (operating system) cannot be enhanced by:
Ans: Installing multiple web browsers to access Internet
143.Businesses derive greater flexibility and enhanced data deployment options by
using________.
Ans: Hybrid Class Cloud
144.What are PDAs?
Ans: Personal Digital Assistants
145.How many types of social networking services are there?
Ans: Three
146.The Practice of sexting involves:
Ans: Sending or receiving sexually explicit material
147.A Botnet is:
Ans: A network of infected computers
148.Data is referred as a collection of:
Ans: Facts and figures
149.MobiShield is a mobile antivirus for which operating system?
Ans: iOS
150.Backdoor refers to:
Ans: A technique in which a system security mechanism is bypassed without
detection to access computer data.

10 | P a g e

You might also like