0% found this document useful (0 votes)
4 views3 pages

Final Assesment

The document consists of multiple modules covering various topics related to data security, network management, and access control. It includes questions and answers on authentication methods, network security measures, penetration testing processes, and incident response plans. Additionally, it addresses specific tools and techniques used in cybersecurity, such as firewalls, phishing prevention, and encryption methods.

Uploaded by

Sayli Gokhale
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views3 pages

Final Assesment

The document consists of multiple modules covering various topics related to data security, network management, and access control. It includes questions and answers on authentication methods, network security measures, penetration testing processes, and incident response plans. Additionally, it addresses specific tools and techniques used in cybersecurity, such as firewalls, phishing prevention, and encryption methods.

Uploaded by

Sayli Gokhale
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

MODULE 1:

1.______ is a measure used to ensure only authorized individuals can access specific data
Ans.: Authentication

2.Which of the following data security measures will you employ if you wish to prevent undesirable traffic from entering the network
Ans.: Firewalls

3.Which type of attacks involves sending fake emails to trick users revealing sensitive information
Ans.: Phishing

4.As you work on your computer you notice that the taskbar hides itself and the screensaver automatically change without your intervention in the windows setting. Which of
the following malware variants is most likely to blame for this

Ans.: Rootkit
5.An attacker attempts to log into a system. If one security measure fails during this event, another should prevent information from being exposed. Which of the following
design principles need to be applied in order to accomplish the aforementioned scenario
Ans.: Defense in Depth.

MODULE 2:

1.You want to assign static IP address on a windows machine. Identify the correct sequence of steps that you will follow after logging in the system to achieve the
aforementioned task.
i)Right click on ethernet Icon and choose properties option
ii)Select Ok
iii)Select Use the following IP address option and enter an IP address and DNS server address manually
iv)Enter ncpa.cpl in the empty box and press enter
v)Click(Windows +R)
vi)Left click on IPV4

Ans.:5-4-1-6-3-2

2.Match the following


Ans.:
1)Mesh Topology -> n*(n-1)/2
2)Star topology ->n
3)Bus topology ->1

MODULE 3

1.Determine the precise order in which you will carry out the penetration testing
i)Analyzing data and risks
ii)Discovery
iii)Reconnaissance
iv)Planning and preparation
v)Report creation
vi)Existing intrusion attempts
vii)Final analysis
Ans.: 4-3-2-1-6-7-5

2.Match the following

Ans.:
A)Intrusion Detection System(IDS) -> Monitors network for malicious activities
B)Firewall -> Filters and monitors network traffic based on policies
C)Security Posture ->Determines an organization's security stance

3.You are using the Linux terminal to create the hackit folder on your desktop and to view every directory present on desktop.
Which of the following commands will you utilising for this purpose
Ans.: Option(iii)-> mkdir hackit
ls

4.Which of the following types of testing will you conduct


Scenario 1: To find network and system weaknesses and offer solutions to lower these risks
Scenario 2: Simulating a malicious attacker's attack while analysing a system to look for any vulnerabilities for an outside hacking attack

Ans.: Scenario 1: Security scanning


Scenario 2: Penetration testing

5. Consider that Shivam visits a website and sees a popup that was not there before, displaying his session cookies. What
might have caused it to appear.
Ans.: Cross-Site Scripting

6. Which tools will you use as a network packet analyzer to provide collected data with as much details as possible
Ans.: Wireshark

7. You use the RC4 encryption algorithm to construct stream cyphers when employing the WEP authentication method.
What length secret key will you use if you use a 24 bit initial value.
Ans.: 40

MODULE 4:
1.Match the following
Ans.:
1)Discretionary Access Control-> The owner of the data determines who can access specific resources

2)Identity-Based Access Control-> Network admins can more effectively manage activity and access based on individual req.

3)Role-Based Access Control->Allows access based on job title and eliminates discretion on a large scale

4)Mandatory Access Control-> Access rights are regulated by a central authority based on multiple levels of security

5)Rule-Based Access Control-> Access is largely context based

2. A system requires fingerprints and iris patterns for user authentication. Which of the following
authentication types does this fall under

Ans.: Type 3

3. If you are creating more granular access control policies based on attributes like IP address, resource type, and
date/time, then which policies must you be implementing
Ans.: Context Aware Access

4. You want to propose an agreement between several enterprises so that subscribers can access the networks of all the enterprises
in the group using the same identification data. Which of the following IAM services will you employ for this purpose
Ans.: Federated Identity Management

5. While creating Cloud App security access policy, you want to explicitly block access according to the policy filters you set.
Which of the following options will you use for this purpose
Ans.: Block

6. While working with access policies, you create an email _______ on a Demo server as an instance of resource type Demo
Ans.: Resource.

MODULE 5:

1. There are different classifications of security control. Security awareness training for employees, data classification, and auditing
fall under which type of control
Ans.: Administrative Controls

2. Match the following


Ans.:
1)Perimeter and extended perimeter strategy-> IDS/IPS filters and IP or MAC address blocking
2)Internal Networks Strategy-> Null Route DNS and Port blocking
3)Endpoint strategy-> Power off the servers and Host based intrusion prevention system.

b,d
e,f
a,c
3. You want to choose an incident management software that will specifically help you to provide the best customer service possible and mostly
focus on solving customer tickets. Which programme will you use for this purpose
Ans.: Zendesk

4. Which of the following practices will you adopt if you want to prevent data breaches that occur through the misuse of company resources

Ans.: Data Security policy


5. Arrange the phases of Incident Response plan in correct order
1)Recovery
2)Identification
3)Lessons learnt
4)Preparation
5)Containment and Eradication
Ans.: 4-2-5-1-3he

MODULE 6:

1. Statement: "Today's temperature in Kolkata is 32 degrees Celsius. Is today's temperature normal?"


Which kind of anomaly is described by the aforementioned statement.
Ans.: contextual anomaly

2. You are working on a checkbox use case where a mandate or guidance requires monitoring or scanning technology. Which discrete
use case are you working on
Ans.: Compliance

3. Some organisations examine the remote host's security posture before allowing it to join the network. This is frequently accomplished with a ______
and agents installed on each host
Ans.: Network quarantine server

4. During an audit, assume that Himesh notices that he needs to encrypt data at rest for a specific project. which tool is commonly used for this
Ans.: TrueCrypt
5. In malware forensics, ______ is a program that duplicates itself to propagate to other computers and wipes out data and files on the computer
Ans.: Worms

6. Arrange the following steps for effective change management process


1)Present a solid business case to stakeholders
2)Identify what will be improved
3)Provide resources and use data for evaluation
4)Plan the change
Ans.: 2-1-3-4

You might also like