Cscu Exam Paper
Cscu Exam Paper
Cscu Exam Paper
o
o
o
o
Backdoors
Troy
Virus
worm
Worm2)To restrict visiting Internet sites,you can modify the setting of your
o
o
o
o
Operating system
ISP
Web browser
Modem
o
o
o
o
5)
Event Viewer
Registy
Logs
Accsess
o
o
o
o
Letters only
Numbers only
Letters in caps and small forms
Letters,numbers and special characters
Beatle Juices
Lms#456JKZX8
13Locksmith
JamesBrown
10)Whatv is Regedit32.exe?
o
o
o
o
Regidit editor
Registred edito for 32 bit system
Registred editor for windows
Registred event viewer
12)What are the three most common risk associated with surfing the Web(selec t 3 answer)
o
o
o
o
Accsess
Word
Powepoint
Excel
Backdoors
o
o
o
Keylogging
Time bomb
Social Engineering
18)Which of the following option would you choose to secure e-mail messages?
o
o
o
o
Digital signature
Digital voice
Digital autograph
Digital photograph
22)Security is a
and
events.
o
o
o
o
26)What should you do if you receive a call from someone in your computer support department
asking for your password?
o
o
o
o
27)Working away from the office gives you are more freedom to disregard .your companys security
standards and policies.(True or False)
o
o
True
False
Ctrl+shift+del
[windows key]+L
Alt+shift+Del
Alt+shift+ctrl
o
o
o
o
30)SSID is the
o
o
o
o
31)While using peer network which of the following precautions would you use?
o
o
o
o
FTP sites
HTTPS sites
Share you root drive
PQP network
33)This tool can capture password when types from the keyboard
o
o
o
o
Eavesdropper
Keylocker
Enterapper
Keylogger
o
o
o
38)What is an incident?
o
o
o
o
telnet
pop
FTP
SMTP
IPconfig
Netstat
Ping
Netconfig
42)While using peer to peer networks which of the following precautions whould you use??
o
o
o
o
o
o
o
Encryption involves protecting a file by hiding them into an anthore file or message so that
only authorized users can access the file
Authenticity of all files downloaded from third party sources cannot be trusted
File integrity can be checked by using MD5 check sum
All application can be identified by using a task manager
Keys,notes
Keys,values
Values,key
Notes ,value
23
80
110
130
50)If you had secure a folder completely,which option will you choose?
o
o
o
o
51)While using peer to peer networks.which of the following precatons would you use?
o
o
o
o