Cscu Exam Paper

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8
At a glance
Powered by AI
Some key cybersecurity concepts discussed include threats like viruses, malware, social engineering attacks, and risks of sharing personal information online. The document also provides tips for secure password management, updating software, and using firewalls and antiviruses.

Threats discussed include viruses, malware, social engineering attacks, theft of personal/financial information.

The document recommends using strong passwords, updating software/applications regularly, using firewalls and antiviruses, scanning files for viruses before opening, and only downloading files from trusted sources. It also mentions securing email with digital signatures and encrypting sensitive folders.

1)Trojans Are otherwise known as.

o
o
o
o

Backdoors
Troy
Virus
worm

Worm2)To restrict visiting Internet sites,you can modify the setting of your
o
o
o
o

Operating system
ISP
Web browser
Modem

3)choose the correct statement from the following.


o
o
o
o

A personal firewall protects system fromInternwt attacks to a certain extent


An antivirus eliminates the need for a firewall
A personal firewall will check all email attachments for malware
An Antivirus is not needed when a firewall filters all ports

4)which of the following statements is wrong regarding good password management?


o
o
o
o

Do not share your password


Do not write down your passwords
Do not use easily guessable password
Do not change password frequenty

o
o
o
o

Do not share your password


Do not write down your passwords
Do not use easily guessable password
Do not change password frequenty

5)

6)choose the correct statement


o
o
o
o

Threat is a potentail violation of security


Threat is a defined way to brech security through a vulneabily
Threat is the existence of weakness or implementaion error
Threat is an assault on system security

7) is database thate stores all installation information of windows os


o
o
o
o

Event Viewer
Registy
Logs
Accsess

8)A stong password will be a combination of

o
o
o
o

Letters only
Numbers only
Letters in caps and small forms
Letters,numbers and special characters

9)Which of he following would you consider as a good password?


o
o
o
o

Beatle Juices
Lms#456JKZX8
13Locksmith
JamesBrown

10)Whatv is Regedit32.exe?
o
o
o
o

Regidit editor
Registred edito for 32 bit system
Registred editor for windows
Registred event viewer

11)How would you active SSL on your system?


o
o
o
o

Download a SSL certificate from a secure server


There is a need to do anything to active SSL
Use the SSL extension in your URL(https)
Register with a security provide such as version

12)What are the three most common risk associated with surfing the Web(selec t 3 answer)
o
o
o
o

Theft of credit card information


Theft of personal identify and other private information
Overloading computer system resources
Contamination by a virus or other malicious code

13)Highest macro security is used in by defaults in MS OFFICE application


o
o
o
o

Accsess
Word
Powepoint
Excel

14)Which statement is correct with regad to path management?


o
o
o
o

Patches are occasionally sent over email


Patches should be download only from the vendor site
Not applying application patches cannot lead to system comproms.
Only operating system patches need to be applied

15)Name the attack whee a person is tricked into disclosing information


o

Backdoors

o
o
o

Keylogging
Time bomb
Social Engineering

16)A Private folder in windows xp is


o
o
o
o

A folder that is not shared


A private shared folder
An encrypted folder
A hidden folder

17)In asymmetric encryption


o
o
o
o

Similar key are used


Two public keys are used
Two privatee keys are used
A public and private key is use

18)Which of the following option would you choose to secure e-mail messages?
o
o
o
o

Digital signature
Digital voice
Digital autograph
Digital photograph

19)What is a cookies?(select 2 answer)


o
o
o
o

A cookie is a dynamic link library loded when windows start


A cookie is a file encryption utility
A cookie is spyware program
A cookie is a file created by an Internet site to store information on your computer

20)A guest account should be


o
o
o
o

Given executable rights


Used for administrator alone
Preferably disabled
Created as a separate login

21)Events are of two types namely


o
o
o
o

Application and Execution


Application and log
Application and security
Execution and security

22)Security is a

and

events.

o
o
o
o

A snapshot of a system in time


One time initative
On going procees
Theoretical concept

23)Event viewer is used for


o
o
o
o

Viewing web events in real time


Viewing system log of events
Viewing progress of events
Viewing mail analysis of events

24)choose the correct statement


o
o
o
o

The skill level needed to conduct an exploit has decreased


Evolution of technology did little to increase ease of use
Security is only a one stage process
Software flaws can be absolutely eliminated

25)Denial of service occurs when


o
o
o
o

Illegitimate users are prevented from using resources


Legitimate users are denied access to resources
ISPS notify a down time to users
An organization denies access to certain sites

26)What should you do if you receive a call from someone in your computer support department
asking for your password?
o
o
o
o

Give it to them without question


Inform them that there is no reason they should need your password and refuse to give it to
them
Ask them why they need the password.If the reason sounds legitimate,go a head and give
Send the password via e-mail to ensure youre giving it to the right person

27)Working away from the office gives you are more freedom to disregard .your companys security
standards and policies.(True or False)
o
o

True
False

28)Which key combination in windows will lock your workstation?


o
o
o
o

Ctrl+shift+del
[windows key]+L
Alt+shift+Del
Alt+shift+ctrl

29)To verify if your are on a secure page,you will check for

o
o
o
o

http:// in the url and padlock sign on the page


http:// in the url and padelock sign on the page
http:// in the url and handlock sign on the page
https:// in the url and handlock sign on the page

30)SSID is the
o
o
o
o

Application of SSL in a wireless LAN


Name of a wireless local area Network
Secure ID given to an individual browsing on a wireless LAN
Encryption off data over radio waves to avoid interception

31)While using peer network which of the following precautions would you use?
o
o
o
o

Use a reliable client software


You can safely transmit password in pqp network
Share files and folder selectively
Scan all downloaded file using av software

32)Which option will you choose to share file more security?


o
o
o
o

FTP sites
HTTPS sites
Share you root drive
PQP network

33)This tool can capture password when types from the keyboard
o
o
o
o

Eavesdropper
Keylocker
Enterapper
Keylogger

34)Computer virues are most commonly spread by?


o
o
o
o

Choosing weak computer passwords


Opening e-mail attachmens
Downloading pictures from web
Reading jokes on the Internet

35)What is a Zombie Machine


o
o
o
o

A machine that is dependant on othor machine for resources


A machine that accespt and acts on instruction from athor machine
A machine that does not respond to any instruction
A machine that does not have a hard drive

36)Which of the following statements are wrong in the contex of downloadingfiles?


o

It is safe to open a file or run a program directly from a location

o
o
o

Never save the file in the root directory of the computer


Before opening the file,save all other work and close other programs
Files must be scanned for viruses/Malware prior to using them

37)Which of the following is the best example of a strong password?


o
o
o
o

Pa44word(a word thatsubtitutes numbers for some of the letters


pateR%office3 (a name or phrase that mixes uppercase and lowercase letters,numbers and
symbols)
good2go(a phrase the mixes letters and numbers)
Dadl969(something easy to remember like a name and birth date)

38)What is an incident?
o
o
o
o

Misuse of computer rersources by runnig malicious codes


Gain unauthorized access to computer
An undesired event of violating the security of a computer
All of the above

39)Which service listens on port 25?


o
o
o
o

telnet
pop
FTP
SMTP

40)Services are programs that


o
o
o
o

Starts when MS OFFICE starts


Starts up when the system boot
Starts when an application is abruptly closed
Starts when the user connects to the internet

41)Which command displayes all.Current TCP/IP network configuration values?(select 2 answer)


o
o
o
o

IPconfig
Netstat
Ping
Netconfig

42)While using peer to peer networks which of the following precautions whould you use??
o
o
o
o

You can safuly transmit password in PQP network


Scan all downloaded file using AV software
Use a reliable client software
Share files and folder selecting

43)when youlogin to your computer,you


o

Identify and authenticate

o
o
o

Identify and authorize


Authenticate and validate
Authenticate and reinforce

44)Which statement is correct with regard to patch management?


o
o
o
o

Not applying application patching cannot lead to system compromble


Only operating system patches need to be applied
Patches should be downloaded only from the vendor site
Patches are occasionally sent ove e-mail

45)Which of the following statements are false?


o
o
o
o

Encryption involves protecting a file by hiding them into an anthore file or message so that
only authorized users can access the file
Authenticity of all files downloaded from third party sources cannot be trusted
File integrity can be checked by using MD5 check sum
All application can be identified by using a task manager

46)choose the correct statement from the following


o
o
o
o

A person firewall will check all e mail attachment for malware


An antivirus eliminates the need for a firwall
An antivirus is not neede when a firwall filters all port
A personal firewall protects system from Internet attacks to a certain extens

47)The folder in windows registry editor is called


o
o
o
o

and the content called

Keys,notes
Keys,values
Values,key
Notes ,value

48)The three types of registry values are called


o
o
o
o

Dword,Numberical and Ascil


Binary,Dword,Ascial
String,Binary,Dword
String,Numberical and Binary

49)The default port on which HTTP listens is


o
o
o
o

23
80
110
130

50)If you had secure a folder completely,which option will you choose?
o

Rename the folder

o
o
o

Hide the folder


Zip the folder
Encrypt the folder

51)While using peer to peer networks.which of the following precatons would you use?
o
o
o
o

You can safely transmit passwords in PQP networks.


Scan all downloaded files using AV software
Use a reliable client software
Share files and folder selection

52)When you login to your computer,you


o
o
o
o

Identify and authentication


Identify and authorize
Authenticate and validate
Authentication and reinforce

You might also like