You are on page 1of 5

TEST CSCU

1) The installation of an antivirus refers to which step of the security


implementation
a) Reaction
b) Precaution
c) Maintenance
Answers B
2) What is a zombie machine?
a) a machine that executes the instructions of another machine
b) a machine that has the symptoms of malware infection.
c) a machine on which a zombie game is played
Answers A
3) The process that accurately ensures that the sender of a message is who
he claims to be is called:
a) Non-repudiation
b) Confidentiality
c) Authenticity
Answers A

4) The system flaws that could not be fixed are:


a) vulnerabilities
b) threats
c) zero days
Answers C

5) A malicious program that allows you to open a port on a machine is


called:
a) a worm
b) a rootkit
c) a backdoor
Answers C
6) A program that looks good but hides a lot of malware in it is:
a) virus
b) trojan
c) spyware
Answers B

7) What are the threats related to phones?


a) bluesnarfing
b) phishing
c) Grooming
d) Eavesdropping
Answers A D
8) Total virus is a tool for analysis:
a) systems
b) links
c) attachments
Answers B
9) The technique of modifying the source code of a site before putting it
back on the Internet is called:
a) Reverse engineering
b) Phishing
c) Spoofing
Answers B
10) To secure an operating system, it is recommended to:
a) Disable the guest account
b) Use a standard account
c) Privilege escalation
Answers B
11) A secure site can be recognized from:
a) padlock, green bar and Https
b) Https Everywhere
c) Malwarebytes
Answers A
12) Associate each protocol with its port
a) SMTP
b) 80
c) 25
d) HTTPS
e) 23
f) 443
g) Telnet
h) http
Answers A->C ; B->H ; D->F ; E->G
13) Sending unwanted messages is called
a) spamming
b) e-mail
c) cookies
Answers A
14) What is the certificate that HTTPS sites use
a) SSL
b) SMTP
c) SQL
Answers A
15) What is a cookie?
a) it is spyware
b) it is a small cake
c) it is a program that records the user's preferences
Answers C
16) The art of convincing a person to obtain their personal information is:
a) Keylogger
b) Social engineering
c) Ransomware
Answers B
17) The attack which consists in intercepting, stealing and modifying the
information of a mobile communication is called :
a) Bluesnarfing
b) Man In The Middle
c) Eavesdropping
Answers B
18) To encrypt her keyboard entries, Maria must install:
a) Keyscramble
b) Keylogger
c) Keystroke
Answers A
19) an information is:
a) a data
b) a publication
c) data that has meaning
Answers C
20) The part of the email that contains the source address, destination
address, subject, location, time, ip address is called:
a) Header
b) Body
c) Signature
Answers A
21) The tool that allows you to block spam is:
a) Spamfighter
b) Lockbin
c) Tor
Answers A
22) The type of encryption that allows you to use a public key and a private
key is:
a) Symmetric encryption
b) Robust encryption
c) Asymmetric encryption
Answers C
23) To secure your email account, it is recommended to configure:
a) double authentication
b) antivirus software
c) metadata
Answers A
24) To keep children safe on the Internet, we must:
a) configure the parental control
b) prohibit a child from using the Internet
c) install a child navigator
Answers C
25) The command that allows to see the open ports is:
a) Ping
b) Ipconfig
c) Netstat
Answers C

You might also like