Cybersecurity Prologue Fresco Play MCQs Answers
Time to Evaluate Your Understanding!
1.Malware cannot inflict physical damage to systems.
- True
- False
Answer: 2)False
2.The type of malware that restricts access to the computer either by encrypting files on the hard drive or by displaying messages demanding a ransom is called __________.
- Trojans
- Scareware
- Ransomware
- Spyware
Answer: 3)Ransomware
3._________ is commonly known for providing backdoor access to the system for malicious users.
- Rootkits
- Botnets
- Trojans
- Worms
Answer: 3)Trojans
4.The type of malware that tricks users by making them believe that their computer has been infected with a virus is called __________.
- Ransomware
- Spyware
- Rootkits
- Scareware
Answer: 4)Scareware
5._________ is a standalone software that does not need human help/host program to spread.
- Ransomware
- Trojan
- Virus
- Worm
Answer: 4)Worm
6.An error message displayed on the system symbolizes virus infection.
- False
- True
Answer: 1)False
7.Which of the following malware is designed for advertising, such as pop-up screens?
- Adware
- Viruses
- Spyware
- Ransomware
Answer: 1)Adware
8.Which of the following is used to draw in users and infect them and deploy fast changing infrastructures?
- Honeynet
- Botnet
- Trojans
- Malnet
Answer: 1)Malnet
9._________________ is a device infected by malware, which becomes part of a network of infected devices administered by a single attacker or attack group.
- Bot
- Honeynet
- Rootkit
- Honeypot
- Time to Evaluate Your Understanding!
Answer: 1)Bot
10.The common term for a software that is considered as nonessential, whose implementation can compromise privacy or weaken the computer's security is called ___________.
- Spam
- Malware
- Malicious Program
- Potentially Unwanted Program
Answer: 4)Potentially Unwanted Program
11.________ is designed to extract data from its host computer for marketing purposes.
- Spyware
- Trojans
- Adware
- Ransomware
Answer: 1)Spyware
12.What is PUP?
- Practially Unwanted Program
- Potentially Unwanted Procss
- Potentially Unwanted Program
- Practically Unrelated Program
Answer: 3)Potentially Unwanted Program
13.The method of protecting programs, networks, and systems from digital attacks is commonly known as __________.
- Cryptography
- Cryptanalysis
- Cryptology
- Cybersecurity
Answer: 4)Cybersecurity
14.Programs that are specifically designed to disrupt the performance of computers/networks are commonly known as __________.
- Ransomware
- Trojans
- Malware
- Virus
Answer: 1)Ransomware
- List of Fresco Play Courses without Hands-On | Fresco Play
- HMTL5 Semantics Elements MCQs Answers | Fresco Play
- HMTL5 Semantics Elements Hands-On Solutions | Fresco Play
- Styling with CSS3 Hands-On Solutions | Fresco Play
- Blockchain Intermedio MCQs Answers | Fresco Play
- Blockchain - Potentes Nexus MCQs Answers | Fresco Play
- Azure Essentials MCQs Answers | Fresco Play
- AWS Essentials MCQs Answers | Fresco Play
Time to Evaluate Your Understanding!
1.The security posture of an organization is defined by the ______ link in the chain.
- Weakest
- Strongest
- Average
Answer: 1)Weakest
2.Which of the following attributes is not a PII?
- Date of Birth
- Credit Card Information
- IP Address
- Account Numbers
- Social Security Number
Answer: 3)IP Address
3.The security attribute that aims to achieve data privacy and protection against unauthorized disclosure is called ____________.
- Integrity
- Authentication
- Availability
- Confidentiality
Answer: 4)Confidentiality
4.As an application of cryptography, digital Signatures and MACs can be used for _____________.
- Authentication
- Confidentiality
- Availability
- Integrity
Answer: 1)Authentication
5.Threats can exploit assets if assets are not vulnerable.
- False
- True
Answer: 1)False
6.Which of the following is an attack against confidentiality?
- Password Attack
- DoS Attack
- Cross Site Scripting Attack
- Man in the Middle Attack
Answer: 4)Man in the Middle Attack
7.Which of the following is an intangible asset?
- Trade Secrets
- Inventory and Machinery
- Business Premises
- Hardware components
Answer: 1)Trade Secrets
8.If a student gains unauthorized access to the student database and modifies his/her marks, what type of violation would it be?
- Integrity
- Both the options
- Confidentiality
Answer: 2)Both the options
9.Which of the following is an attack against availability?
- Birthday Attack
- DoS Attack
- Man in the Middle Attack
- Zero Day Attack
Answer: 2)DoS Attack
10.Choose the correct option.
- Risk=Threat/Vulnerability
- Risk=Threat*Vulnerability
- Threat=Risk*Vulnerability
- Vulnerability=Threat/Risk
Answer: 3)Threat=Risk*Vulnerability
11.The type of attack in which the attacker intercepts the information in transit without altering it.
- Active Attack
- Invasive Attack
- Passive Attack
Answer: 3)Passive Attack
12.The process of converting a message to an unintelligible form with the help of an algorithm and a key is known as _______.
- Cryptography
- Encryption
- Cryptology
- Cryptanalysis
Answer: 2)Encryption
13.What is the practice and study of techniques for secure communication in the presence of third parties, commonly called?
- Cryptography
- Encryption
- Cryptanalysis
- Cybersecurity
Answer: 1)Cryptography
14.Which of the following security attribute is compromised when data or information is changed or tampered, either accidentally or maliciously?
- Availability
- Integrity
- Confidentiality
- Repudiation
Answer: 2)Integrity
15.Which of the following encryption methods is more suited for key exchange, non-repudiation, and authentication?
- Assymmetric Key Encryption
- Symmetric Key Encryption
Answer: 1)Assymmetric Key Encryption
16.Passive attacks are considered a threat to _______.
- Authenticity
- Availability
- Confidentiality
- Integrity
Answer: 3)Confidentiality
17.Which of the following attack method aims to gather confidential information by deceiving the victim?
- Phishing
- Spoofing
- Drive-by Download
- Spamming
Answer: 1)Phishing
18.Which encryption method is more suitable for quickly encrypting large amounts of data?
- Assymmetric Key Encryption
- Symmetric Key Encryption
Answer: 2)Symmetric Key Encryption
Time to Evaluate Your Understanding!
1.A type of assessment that is often performed in a sandbox-virtual environment to prevent malware from actually infecting production systems is known as _________.
- Black Box Testing
- Dynamic Analysis
- Static Analysis
- Penetration Testing
Answer: 2)Dynamic Analysis
2.A proactive process to predict potential risks efficiently.
- Threat Modeling
- Threat Analysis
- Threat Hunting
- Threat Landscaping
Answer: 2)Threat Hunting
3.SABSA Framework is commonly represented as _______ SABSA matrix.
- 4x4
- 8x8
- 5x5
- 6x6
Answer: 4)6x6
4.A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is called _________.
- Invisible Threats
- Hidden Threats
- Advanced Persistent Threats
- Malicious threats
Answer: 3)Advanced Persistent Threats
5.A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker's pov is called ___________.
- Threat Landscaping
- Threat Modeling
- Threat Analysis
- Threat Hunting
Answer: 2)Threat Modeling
6.Which of the following are the three phases of Incident response maturity assessment?
- Prepare, Response, and Follow-up
- Prepare, Identify, and analyze
- Reconnaissance, Installation, Command, and control
- Identify, Decompose, and Mitigate
Answer: 1)Prepare, Response, and Follow-up
Time to Evaluate Your Understanding!
1.Phishing emails include fake notifications from banks and e-payment systems.
- False
- True
Answer: 2)True
2.Which of these is true with respect to passwords?
- None of the options
- Passwords need to be easy
- Passwords can be kept openly
- Passwords need to be atleast 8 chars of length
Answer: 4)Passwords need to be atleast 8 chars of length
3.Which of these are Threats related to Email Security?
- All the options
- Spoofing
- Pharming
- Phishing
- Spam
Answer: 1)All the options
4.How do we define RADIUS?
- Remote Authorization Dial-In User Service.
- Remote Authentication Dial-In User Service.
- Remote Authentication Service.
- Remote Authentication Dial-In Unified Service.
Answer: 2)Remote Authentication Dial-In User Service.
Final Assessment
1.________ is designed to extract data from its host computer for marketing purposes.
- Ransomware
- Trojans
- Adware
- Spyware
Answer: 4)Spyware
2.The telephone version of phishing that exploits social engineering techniques is known as __________.
- Pharming
- Smishing
- Vishing
Answer: 3)Vishing
3.A type of assessment that is often performed in a sandbox-virtual environment to prevent malware from actually infecting production systems is called ________.
- Static Analysis
- Black Box Testing
- Dynamic Analysis
- Penetration Testing
Answer: 3)Dynamic Analysis
4.The three chains of RADIUS Security are ___________________.
- Authentication, Availability, Accounting
- Authorization, Availability, Accounting
- Authentication, Authorization, Accounting
Answer: 3)Authentication, Authorization, Accounting
5.An error message displayed on the system, symbolizes virus infection.
- False
- True
Answer: 1)False
6.A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is known as ______________.
- Malicious threats
- Advanced Persistent Threats
- Hidden Threats
- Invisible Threats
Answer: 2)Advanced Persistent Threats
7.As an application of cryptography, digital Signatures and MACs can be used for _____________.
- Confidentiality
- Integrity
- Availability
- Authentication
Answer: 4)Authentication
8.The process of converting a message to an unintelligible form with the help of an algorithm and a key is known as _______.
- Encryption
- Cryptography
- Cryptanalysis
- Cryptology
Answer: 1)Encryption
9._________ is a standalone software that does not need human help/host program to spread.
Ransomware
- Worm
- Trojan
- Virus
Answer: 2)Worm
10.What is PUP?
- Potentially Unwanted Program
- Practially Unwanted Program
- Potentially Unwanted Procss
- Practically Unrelated Program
Answer: 1)Potentially Unwanted Program
11._________ is commonly known for providing backdoor access to the system for malicious users.
- Trojans
- Worms
- Rootkits
- Botnets
Answer: 1)Trojans
12.Which of the following is a physiological biometric that could be used for authentication?
- Signature
- Voice Recognition
- Facial Recognition
- Gait
- All the options
Answer: 3)Facial Recognition
13.Which of the following encryption methods is more suited for key exchange, non-repudiation, and authentication?
- Symmetric Key Encryption
- Assymmetric Key Encryption
Answer: 2)Assymmetric Key Encryption
14.What is the type of malware that restricts access to the computer either by encrypting files on the hard drive or by displaying messages demanding a ransom?
- Ransomware
- Spyware
- Trojans
- Scareware
Answer: 1)Ransomware
15.A pharming tactic in which the DNS table in a server is modified to deceive users by redirecting to fraudulent websites.
- DNS Phishing
- Smishing
- Vishing
- DNS Poisoning
Answer: 4)DNS Poisoning
16.Threats can exploit assets if assets are not vulnerable.
- False
- True
Answer: 1)False
17.Which of the following security attribute is compromised when data or information is changed or tampered, either accidentally or maliciously?
- Availability
- Confidentiality
- Integrity
- Repudiation
- Confidentiality and Integrity
Answer: 5)Confidentiality and Integrity
18.Which of the following is an effective solution to ensure confidentiality?
- Logging and Auditing
- Encryption
- Network Monitoring
- Data Hiding
Answer: 2)Encryption
19.A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker's pov is called _______________.
- Threat Modeling
- Threat Landscaping
- Threat Analysis
- Threat Hunting
Answer: 1)Threat Modeling
20.__________ is a proactive process to predict potential risks efficiently.
- Threat Hunting
- Threat Modeling
- Threat Analysin
- Threat Landscaping
Answer: 1)Threat Hunting
ReplyDeletevaluable blog,Informative content...thanks for sharing, Waiting for the next update..
What is cybersecurity?
The Benefits of taking Cybersecurity Training
Post a Comment
Any comments and suggestion will be appreciated.