Final Assesment
Final Assesment
1.______ is a measure used to ensure only authorized individuals can access specific data
Ans.: Authentication
2.Which of the following data security measures will you employ if you wish to prevent undesirable traffic from entering the network
Ans.: Firewalls
3.Which type of attacks involves sending fake emails to trick users revealing sensitive information
Ans.: Phishing
4.As you work on your computer you notice that the taskbar hides itself and the screensaver automatically change without your intervention in the windows setting. Which of
the following malware variants is most likely to blame for this
Ans.: Rootkit
5.An attacker attempts to log into a system. If one security measure fails during this event, another should prevent information from being exposed. Which of the following
design principles need to be applied in order to accomplish the aforementioned scenario
Ans.: Defense in Depth.
MODULE 2:
1.You want to assign static IP address on a windows machine. Identify the correct sequence of steps that you will follow after logging in the system to achieve the
aforementioned task.
i)Right click on ethernet Icon and choose properties option
ii)Select Ok
iii)Select Use the following IP address option and enter an IP address and DNS server address manually
iv)Enter ncpa.cpl in the empty box and press enter
v)Click(Windows +R)
vi)Left click on IPV4
Ans.:5-4-1-6-3-2
MODULE 3
1.Determine the precise order in which you will carry out the penetration testing
i)Analyzing data and risks
ii)Discovery
iii)Reconnaissance
iv)Planning and preparation
v)Report creation
vi)Existing intrusion attempts
vii)Final analysis
Ans.: 4-3-2-1-6-7-5
Ans.:
A)Intrusion Detection System(IDS) -> Monitors network for malicious activities
B)Firewall -> Filters and monitors network traffic based on policies
C)Security Posture ->Determines an organization's security stance
3.You are using the Linux terminal to create the hackit folder on your desktop and to view every directory present on desktop.
Which of the following commands will you utilising for this purpose
Ans.: Option(iii)-> mkdir hackit
ls
5. Consider that Shivam visits a website and sees a popup that was not there before, displaying his session cookies. What
might have caused it to appear.
Ans.: Cross-Site Scripting
6. Which tools will you use as a network packet analyzer to provide collected data with as much details as possible
Ans.: Wireshark
7. You use the RC4 encryption algorithm to construct stream cyphers when employing the WEP authentication method.
What length secret key will you use if you use a 24 bit initial value.
Ans.: 40
MODULE 4:
1.Match the following
Ans.:
1)Discretionary Access Control-> The owner of the data determines who can access specific resources
2)Identity-Based Access Control-> Network admins can more effectively manage activity and access based on individual req.
3)Role-Based Access Control->Allows access based on job title and eliminates discretion on a large scale
4)Mandatory Access Control-> Access rights are regulated by a central authority based on multiple levels of security
2. A system requires fingerprints and iris patterns for user authentication. Which of the following
authentication types does this fall under
Ans.: Type 3
3. If you are creating more granular access control policies based on attributes like IP address, resource type, and
date/time, then which policies must you be implementing
Ans.: Context Aware Access
4. You want to propose an agreement between several enterprises so that subscribers can access the networks of all the enterprises
in the group using the same identification data. Which of the following IAM services will you employ for this purpose
Ans.: Federated Identity Management
5. While creating Cloud App security access policy, you want to explicitly block access according to the policy filters you set.
Which of the following options will you use for this purpose
Ans.: Block
6. While working with access policies, you create an email _______ on a Demo server as an instance of resource type Demo
Ans.: Resource.
MODULE 5:
1. There are different classifications of security control. Security awareness training for employees, data classification, and auditing
fall under which type of control
Ans.: Administrative Controls
b,d
e,f
a,c
3. You want to choose an incident management software that will specifically help you to provide the best customer service possible and mostly
focus on solving customer tickets. Which programme will you use for this purpose
Ans.: Zendesk
4. Which of the following practices will you adopt if you want to prevent data breaches that occur through the misuse of company resources
MODULE 6:
2. You are working on a checkbox use case where a mandate or guidance requires monitoring or scanning technology. Which discrete
use case are you working on
Ans.: Compliance
3. Some organisations examine the remote host's security posture before allowing it to join the network. This is frequently accomplished with a ______
and agents installed on each host
Ans.: Network quarantine server
4. During an audit, assume that Himesh notices that he needs to encrypt data at rest for a specific project. which tool is commonly used for this
Ans.: TrueCrypt
5. In malware forensics, ______ is a program that duplicates itself to propagate to other computers and wipes out data and files on the computer
Ans.: Worms