Sunteți pe pagina 1din 6

Alex, the coach of Manchester United, called up Wayne, the captain of the team, to

discuss the tactics they would employ in the upcoming Champions League Final. The
following day, Alex received an email with the transcript of the conversation he
had with Wayne. The sender of the email threatened to make Alex’s tactics public,
if he did not pay him $5000.
Which form of mobile device attack was Alex a victim of?
-Social engineering
-Man in the middle attack
-Eavesdropping
-Phishing

Lucy, a 55 year-old woman, was not a technically savvy person. She did not install
or enable any applications on her computer, and only used it for looking up recipes
and knitting patterns. After some time, Lucy’s computer started giving her
problems. It often displayed the Blue Screen of Death (BSOD) and unwanted windows
kept popping up whenever she went online. When a computer technician checked Lucy’s
computer, it was discovered that her computer was infected with malware.
Which inbuilt Windows software should Lucy have enabled to prevent malware
infection in her computer?
-Simple file sharing
-Task manager
-Jump lists
-Windows Defender

Amy received an email from an official claiming to be from ABC Parcel Services. The
email asked her to collect a gift parcel sent by her friend three weeks ago. The
service claimed that they were unable to deliver the parcel to Amy, as the address
provided was wrong. The service asked her to print out the attached invoice copy,
fill it, and collect the package from the branch office located in her city.
Which type of email security threat could Amy have faced, if she clicked or
downloaded the attachment?
Malicious user redirection
Hoax mail
Malicious email attachment
Phishing

As part of his security implementation plan, Glenn was updating his firewall. Which
aspect of the security implementation plan was Glenn working on?
Precaution
Nonrepudiation
Reaction
Maintenance

Which of the following terms refers to software that attackers create to install on
a victim’s computer in order to compromise its security?
Malware
Dropbox
Bitlocker
Lockbin

Which of the following fundamental concepts of security refers to an action taken


in advance to protect the system against threats or dangers?
Precaution
Nonrepudiation
Maintenance
Reaction

A newly established ITES company plans to launch a website which enables its users
to share pictures and videos with each other. Apart from this, users can also
comment on these pictures and share them further.
Under which of the following cloud categories will the company’s product come?
Public Cloud
Community cloud
Private Cloud
Hybrid Cloud

Isaac is transferring all the data from his computer to an external drive as he
wants to format his laptop. While moving the data, he accidentally hits delete
instead of cut on one of the files and without realizing, hit the enter key when
the computer prompted to confirm his action. As the file was a huge one, it did not
go to the recycle bin and got permanently deleted.
What type of data loss is this?
Human error
Software failure
Computer virus
Hardware theft

Horace is a 64 year-old man who worked as an accountant for SN Associates before


his retirement. The company gifted him a laptop at the time of his retirement.
Since Horace was not a technically savvy person, he did not install any
applications on his laptop, and only used it for checking his email and playing
poker online. After some time, Horace’s laptop started giving him problems. It
crashed frequently, often displayed the Blue Screen of Death (BSOD), and unwanted
windows kept popping up whenever he went online. When Horace took his laptop to the
service center, he was told that his laptop was infected with malware.
Which software should Horace have installed to prevent malware infection in his
laptop?
Skype
Antivirus software
One Drive
Adobe Reader

Which of the following terms refers to a collection of information that defines or


describes the user and his or her interests?
Profile
Facebook group
Account settings
Timeline

Duke is taking some of the best pictures he has yet as an amateur photographer in a
pen drive to get his work assessed by an expert. On the subway an unknown person
picks his pocket. Along with his wallet Duke also lost the pen drive with his
pictures. Since he had not made any more copies of those pictures, he lost them
forever.
What type of data loss is this?
Natural disaster
Hardware theft
Malware attack
Software theft

Tom, a 14 year-old boy has been chatting online with Adam, whom Tom assumes is 14
years old as well. Over the months, they built up a great ‘online’ friendship,
playing online games, checking out EDM websites, continuing with their friendly
rivalry over football, and just talking about ‘guy’ stuff. When Adam invited Tom
over to meet him, Tom was obviously excited. However, when Tom met Adam, he was
shocked, as Adam turned out to be a 35 years old man. Despite this shock, Tom
entered Adam’s house, as he trusted him. Tom was having a great time playing PS3
with Adam, until the time Adam touched him inappropriately. Tom ran away from
Adam’s house and did not know what to do.
Which form of cyber-attack was Tom a victim of?
Pornography
Grooming
Phishing
Social engineering

Luke works as an analyst for AS Pvt. Ltd. His job there is to analyze statistics
and records obtained from people to improve the sales of the company. However,
recently the statistics and records given to him have been incorrect, thus leading
to gross miscalculations and wrong predictions on his part. Which of the terms
listed below, best describes these statistics and records that are incorrect?
Information
Archives
Data
Indicators

- Select Question -
select
Which of the following helps to backup data on a Mac?
Extensions
Time Machine
App Store
Internet Accounts

Which of the following terms refers to malicious software that is specifically


built to target mobile phones and smartphones systems?
Mobile malware
Broken cryptography
Phishing
Unmanaged applications

A new online service allows people living with roommates to feed in all their house
hold expenses in its ‘share calculator’ program. The program then calculates how
much each person is supposed to pay and sends a detailed report to all those who
are listed as roommates for that particular transaction.
The above mentioned service is an example of which of the following?
Software as a Service
Infrastructure as a Service
Network as a Service
Platform as a Service

Samuel, a network admin in an IT firm, has just discovered a phishing site known
for targeting corporate entities. Several employees have received emails with the
domain name, which is the same as that of this site. In order to prevent the
company’s network from being corrupted, Samuel decides to block all incoming and
outgoing traffic from that site.
Which of the following defense mechanisms can Samuel use to implement this?
Firewall
Encryption
Disk encryption
Virus

Harry, a 21 year-old college-going student, was working on his dissertation when


suddenly a message flashed on his screen, “All files on your computer have been
encrypted. You must pay $1000 within 72 hours to regain access to your data.”Even
after Harry paid the money, he was not able to access his data, and all the
documents on his dissertation were lost.
Which malware attack was Harry a victim of?
Virus
Ransomware
Botnet
Adware

Raymond received an email from an official claiming to be from his bank. The email
requested Raymond to send his personal details since the customer database of the
bank was being updated. Upon confirmation from the bank, Raymond was told that the
bank had not sent any emails asking for the personal details of their customers.
Which cyber-attack would Raymond have been a victim of if he had replied to the
email?
Eavesdropping
War driver
Phishing
Man in the middle attack

Imagine getting a letter from the Inland Revenue Authority of Singapore (IRAS)
demanding that you pay $5,700 in taxes. This is what happened to Rick. He received
a letter informing him that he owed the government unpaid income tax on wages he
never earned. The IRAS letter said that Rick had worked at several places. However,
Rick is only 15 years old and his only job was working at his uncle’s grocery store
during the summer. He had never even visited some of the places where the letter
said he worked. Rick was not sure what to do next. After all, he has never even
had a “real” job like those listed in the letter.
What is going on in this scenario?
Nigerian scam
Identity Theft
Social engineering
Phishing

Susan, a 15-year-old girl, loves spending her free time baking and cycling.
However, recently she has been spending all of her free time glued to the computer.
She shows no interest in her hobbies anymore and looks depressed most of the time.
Her parents also noticed that whenever they enter her room, she quickly changes the
computer screen. Understandably, Susan’s parents are worried about her.
What could be the reason for her behavior?
Victim of online child abuse
Social engineering
Too much pressure at school
Unsolicited emails

Hermione is a 21 year-old college student. She loves spending time on Facebook.


However, with her final exams approaching, she feels that spending time on Facebook
will harm her exam results. Hence, she enables a particular Facebook feature, with
the help of which, she will not get any emails or notifications from Facebook.
Which Facebook feature did Hermione use?
Deactivate account
Where you’re logged in
Who can look me up
Login alerts

Harold, an associate at AQ Corporation, received a phone call from a person


claiming to be Bob from the IT department. Bob told Harold that he had noticed that
Harold’s computer was running slow, and could help him fix it. Harold, not having
much knowledge regarding computers, readily agreed. Following Bob’s instructions,
Harold typed in some commands on his computer, and gave remote access to Bob to
have his computer fixed. Later on, Harold noticed that confidential information
concerning his clients was missing from his computer.
Which attack was Harold a victim of?
Evil twin
Social engineering
Bluesnarfing
War driver

Ellie, an 18 year-old student, shares her Windows 8 computer with her younger
brother, Adam. Adam is very mischievous and whenever he is on the computer, he
ruins Ellie’s college assignments. Ellie, who is fed up of this decides to encrypt
the drive that contains her assignments. She uses inbuilt Windows software to
encrypt the drive so that Adam cannot access the drive.
Which software did Ellie use?
SPAMfighter
BitLocker
Adobe
Skype

John is an 18 year-old college-going student. He loves to read books and listen to


music on his laptop. He regularly downloads e-books and music from the internet.
Lately, whenever John has been spending time on his laptop, the laptop begins
displaying the infamous Blue Screen of Death (BSOD). Upon taking his laptop to the
service center, John was told that his laptop was infected with malware.
Which symptom of malware infection is John’s laptop displaying?
Unexpected crashes
Hard drive malfunction
Laptop screen malfunction
Slow system

Sam uses his work laptop to watch pirated movies at home sometimes. When he tried
to watch the latest movie he downloaded, the movie file did not play even after
trying on several different players. Within a day of this, Sam noticed that many of
his files were vanishing one after the other from his laptop even though neither he
nor anyone else deleted them. The network administrator of his company, after
taking a look at his computer told him that the movie files, which did not play,
definitely had something to do with this peculiar behavior.
What type of data loss could this be?
Human error
Computer virus
Natural disaster
Software failure

XYZ Infra Solutions, a startup company is looking for a cloud service provider who
can provide virtual machines, virtual local area network, customized software
applications, on demand storage, IP addresses, and firewalls to meet its business
needs.
Which of the following cloud computing services can meet the business needs of the
company?
Platform as a Service
Software as a Service
Application as a Service
Infrastructure as a Service

Fred, a 14 year-old boy, is an only child. Fred loves spending time on his Mac OS X
browsing the internet. When his parents are not at home, he spends hours at a
stretch on the computer. Once, when Fred’s parents come home late from work and
find him on the Mac, they decided to limit his computer time. Enabling an inbuilt
feature in the Mac, Fred’s parents limit his computer time to two hours daily.Which
MAC OS X feature did Fred’s parents enable?
FileVault
UAC slider bar
Parental control
Jump lists

Which of the following antivirus techniques refers to the process of comparing the
current state of stored programs to a previously recorded state, which is known to
be free of malware?
Scanning
Heuristics analysis
Integrity checking
Bookmarks method

Which of the following terms refers to the process of protecting information, and
the infrastructure that stores it?
Keystroke logging
Data security
Availability
Maintenance

Which of the following refers to the periodic patching of system files to fix any
issues in the previous version of the Windows OS?
Task manager
FileVault
Windows Updates
Windows Firewall

S-ar putea să vă placă și