Cyber Security and Privacy-Week 7
Cyber Security and Privacy-Week 7
Week 7 Quiz
(All questions carry 1 point each)
a. Registration authority
b. Public key infrastructure
c. Digital signature
d. Certificate authority
2. Which ring does the kernel, the core of the operating system, typically operate?
a.Ring 2
b.Ring 1
c.Ring 0
d.Ring 3
Ans: c.Ring 0
Explanation: The kernel requires the highest level of privilege to manage hardware and system
resources directly. Therefore, it usually operates in Ring 0, the innermost and most privileged ring.
6. Which of the following statements about Virtual Private Networks (VPN) are true?
7. Endpoint Detection and Response (EDR) solutions are primarily focused on:
a.Securing network perimeters and firewalls.
b.Protecting individual user devices from threats.
c.Monitoring and analyzing network traffic for malicious activity.
d.Providing vulnerability assessments for servers and applications.
8.Cryptojacking is a cyber attack that leverages a victim's computer resources for the attacker's financial
gain. Which of the following best describes the attacker's activity in a cryptojacking attack?
a.Encrypting the victim's data and demanding a ransom payment.
b.Gaining unauthorized access to the victim's personal information for resale.
c.Silently using the victim's processing power to solve complex mathematical problems for financial
reward.
d.Disrupting the normal operation of the victim's system to cause inconvenience.
Ans: c.Silently using the victim's processing power to solve complex mathematical problems for
financial reward.
Explanation : Cryptojacking involves secretly using the victim's computer's processing power (CPU or
GPU) to solve complex mathematical problems associated with cryptocurrency mining. These
computations generate cryptocurrency for the attacker, providing them with financial gain without
the victim's knowledge or consent.
9. What kind of infrastructure Advanced Persistent Threat (APT) groups are typically known for
targeting?
a.Personal computers of home users.
b.Critical infrastructure essential for national security (e.g., power grids, communication networks).
c.Public Wi-Fi networks at cafes or airports.
d.Outdated operating systems on personal devices of insignificant value
Ans: b.Critical infrastructure essential for national security (e.g., power grids, communication
networks).
Explanation : APT groups typically target high-value targets with significant impact, not personal
devices or public Wi-Fi.
10. Which of the following is NOT one of the stages in the Intrusion Kill Chain framework?
a.Reconnaissance
b.Exploitation
c.Cleanup
d.Command and Control
Ans: c.Cleanup
Explanation : The stages of the Intrusion Kill Chain typically include Reconnaissance, Weaponization,
Delivery, Exploitation, Installation, Command and Control, and Actions on Objectives. "Cleanup" is not
one of the recognized stages.