You are on page 1of 7

Secure Computer User (CSCUv2) Secure Computer User (CSCUv2)

Pre-assessment Questions Pre-assessment Questions

6. Jack recently purchased a new laptop. In order to keep his laptop secure, he installed
antivirus software on it. However, he does not know whether the antivirus software is
1. Which of the following elements of security refers to ensuring that information is
working. Which test should he perform to check whether the antivirus is working?
accurate, complete, reliable, and is in its original form?
• EICAR test
• Confidentiality
• Power-on self-test
• Authenticity
• Integration test
• Availability
• Black box test
• Integrity
7. Amy, a school-going girl was researching the White House for a school project.
2. Which of the following terms refers to processed data?
Whenever she tried visiting the White House website, she ended up landing at the same
• Phished
pornographic website. Concerned about the matter, she wrote an email to the White
• Authentic
House informing them that pornographic content was being displayed on the site. In a
• Information
reply to her email, White House officials assured her that they had thoroughly checked
• Nonrepudiated
the site and found no such content. When Amy tried to access the site again, to her
frustration she ended up at the same porn site.
3. Which of the following terms refers to the act of accessing someone’s information
What could be the reason for Amy to repeatedly keep landing at the pornographic
without his or her knowledge?
website?
• Phishing
• Spam
• Hacking
• Bluesnarfing
• Social engineering
• Insufficient transport layer protection
• Bluesnarfing
• Malicious redirection
4. Which of the following terms refers to a Windows security feature, which prevents
8. Andrew, a senior associate at the XZ law firm, is reviewing sensitive documents on
unauthorized users from accessing a computer?
behalf of a client for a high profile case. After working for several hours straight
• Control panel
reviewing documents, he takes a coffee break and heads out to the local coffee house.
• User Account Control
After ordering coffee, Andrew logs on to the coffee shop Wi-Fi. He begins working on
• Encrypting File System (EFS)
the document repository online. Once his work is finished, he pays his bill and leaves for
• Task manager
home. The next day, the Internet is flooded with trade secrets of his client, and
obviously, Andrew is held responsible for it as he was the only one who had access to
5. Which of the following terms refers to allowing a user to bypass the login functionality
the information. Andrew is perplexed as to how the data theft occurred, especially
by restarting the system, in Mac OS X?
when he had security measures in place. What could have caused the data theft?
• App downloads
• Usage of public Wi-Fi
• Software updates
• Phishing
• Guest account
• Spam
• Automatic login
• Configuration problems

Copyright © by EC-Council Copyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited. All Rights Reserved. Reproduction is Strictly Prohibited.
Secure Computer User (CSCUv2) Secure Computer User (CSCUv2)

Pre-assessment Questions Pre-assessment Questions

9. Which of the following terms refers to a list of friends, who can help users to login into 13. Sharon received the following email from an unknown person:
their Facebook account if they forget their password?
Dear Friend,
• Restricted list
I am a Senior Account Manager of XYZ Bank. My name is George Bitts. I was personal
• Profile settings
account manager to the CEO of a reputed steel company in Europe. He and his family
• Trusted contacts
died in air crash, while visiting Canada, five years back. Since then, I have enquired
• Tagging
about his next kin, but my attempts are useless. Recently our bank decided that it would
keep the CEO’s $45 million if no kin is found.
10. Which of the following terms refers to a hacking technique, which employs the process
of creating a fake URL mimicking the legitimate one? Hence, I am requesting you to help me in getting this amount before the bank keeps it. I
• Site flaws wish to present you before the bank official as the CEO’s next kin, so that this huge
• Evil twin amount will be transferred to your account. Once the transfer is complete, the funds
• Phishing would be shared between us.
• URL spoofing
If you are interested in this deal, please respond immediately to this email.
11. Jason likes spending his free time on social networking sites, especially Facebook. One Regards,
day while he was on Facebook, he clicked a link whose title was “You’ll never believe
George Bitts
what this six-year-old found in his Happy Meal”. Then he liked the Facebook page that
had shared the link. Later, when he logged into his profile again, he noticed that his Which type of email security threat is this?
Facebook Wall was cluttered with spam, and links from the page he had liked had been
• Nigerian scam
shared with his friends.
• Spam
Which Internet attack was Jason a victim of?
• Phishing
• Social engineering
• Spy-phishing
• Evil twin
• Likejacking
14. Rita’s phone was stolen from her when she was in the bus returning home from visiting
• Bluesnarfing
her sister. When she went to her service provider to block the SIM, the assistant there
told her about a sequence of numbers, which is located near the battery in a phone. The
12. Jessica, an 18-year-old girl, regularly posts her selfies on Facebook. Recently some
assistant proceeded to tell Rita that this number is used to identify a mobile device. It
strangers have been posting lewd comments on her photos. These comments are
also can be used to remotely disable or blacklist a stolen phone.
upsetting Jessica and she wants them to stop.
Which number was the assistant talking about?
Which Facebook setting should Jessica enable to prevent strangers from viewing her
• International Mobile Subscriber Identity (IMSI)
photos?
• International Mobile Station Equipment Identity (IMEI)
• Deactivate account
• Mobile Equipment Identifier (MEID)
• Restricted list
• Electronic Serial Numbers (ESNs)
• Where you're logged in feature
• Who can see my stuff feature

Copyright © by EC-Council Copyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited. All Rights Reserved. Reproduction is Strictly Prohibited.
Secure Computer User (CSCUv2) Secure Computer User (CSCUv2)

Pre-assessment Questions Pre-assessment Questions

15. Cameroon always keeps his phone’s Bluetooth on and in discoverable mode despite 18. Christie is a DJ by profession. She regularly mixes new tracks and releases them online
being warned about it. He gets a few pairing requests a day but he always accepts them on her channel. She is about to go on vacation to the Caribbean where she intends to
without verifying since most of the times it is his neighbors who want to share pictures find inspiration on the sunny beaches and come up with some new original music. She
with him. Mitch, one of Cameroon’s friends, owes him $500. Cameroon just got a text does not want to carry more than required memory storage sticks with her as she
from Mitch asking him for his account number so that he could transfer the money intends to move around a lot and fears that she may lose some of the memory sticks,
online. Cam texted Mitch his account number and within a few minutes got a reply text along with her music, in transit. Thus, she requested some additional space from her
from Mitch saying that he had transferred the amount. Cameroon checked his account current cloud service provider so that she can upload her tracks on the cloud that will
but could not see the money from Mitch. When he called Mitch, he confirmed that he eliminate the need to carry extra memory sticks. Which particular advantage of a cloud
had transferred the money to account # 0012548785875 whereas Cameroon’s account service helped Christie out in her situation?
number was #002154789247. Mitch immediately came over and showed Cameroon the • Cost effective
text he had received from him, which said that the account number was • Portability
0012548785875. • Flexibility
Which attack was Cameroon most probably a victim of in this scenario? • Reliability
• Man in the middle attack
• Backdoor hacking 19. Which type of cloud caters to a group of organizations who share the same interests?
• Phishing • Private cloud
• Bluesnarfing • Public cloud
• Community cloud
16. A five-year old finance company was looking for a cloud computing platform to test the • Hybrid cloud
efficiency of its data and recently developed applications. The company wanted its data
and applications to be accessible only by its employees due to security concerns. 20. John recently set up a wireless network at his home. To avoid eavesdropping on his
Which of the following type of cloud computing platforms would be a best choice for personal communication, John implemented a secure method of data communication.
the finance company? He used WPA2( Wi-Fi Protected Access 2) to secure his home network from intruders.
• Private cloud Which of the following methods of securing his network did John employ?
• Public cloud • Authentication
• Community cloud • Certification
• Hybrid cloud • Encryption
• Authorization
17. Claire is a fashion designer by profession. Recently some of her designs were stolen
along with her laptop and after a few days, some other designer came up with a
collection that was originally hers. To prevent this from happening again, she decided to
store all her designs on a cloud henceforth. She is looking for a cloud service which
would suit her needs. Which aspect of the cloud service’s terms and conditions should
she pay most attention to?
• Data location
• Data ownership
• Data migration
• Data permanency

Copyright © by EC-Council Copyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited. All Rights Reserved. Reproduction is Strictly Prohibited.
Secure Computer User (CSCUv2) Secure Computer User (CSCUv2)

Pre-assessment Questions Pre-assessment Questions

21. Karen is a student who frequently visits the coffee house next to her dorm as it has free 25. Ellen just received her new driver’s license and noticed that all her details on it were
Wi-Fi. Karen always connects to the Wi-Fi named Cup2, but during her latest visit she correct apart from her picture. The picture was that of a man whom she did not know.
noticed two Wi-Fi signals with the same name. She did not pay too much attention to it She brought this to the notice of the DMV officials. Upon investigation, they realized
though and logged on to the first signal that showed up on her laptop. The following day that the computer was selecting the wrong pictures to add to the licenses of women
Karen noticed that $2000 was transferred from her online bank account to an unknown applicants specifically. Ellen had to ultimately get her picture taken once again to get a
account. She was certain that she did not make any such transfer and had not revealed correct driving license.
any of her bank details to anyone over the internet or otherwise. Which of the following best describes the above issue?
Which of the following threats to wireless networks could have been behind Karen’s • Software failure
situation? • Human error
• Evil twin • Hardware failure
• Configuration problem • Natural disaster
• Encryption problems
• Virus attack 26. Josh just finished his coffee at a coffee shop with his friends and booked a cab through
an app on his phone to go home. The app showed that his cab would arrive at his
22. What is the most secure encryption method for home wireless network? location in 10 minutes. To kill some time, he clicked a few pictures of him and his friends
• WEP and posted them online. Karen, one of his friends, checked his post and after a bit of
• WPA digging deeper within minutes she could determine exactly where Josh was at that
• WPA2 moment. Which feature helped Karen determine Josh’s location?
• WAP2 • Pinpointing
• Geotagging
23. Which prefix to a website name symbolizes that the site is using a secured connection? • Mapping
• https// • Streaming
• https://
• https:\\ 27. Jesus keeps logging into his Facebook account from multiple devices and it is getting
• https\\ difficult for him to keep track of all the devices he uses to log in. To keep his account
24. ABC Info Ltd. is installing new servers in its offices with larger hard drive capacities as secure and not allow any unauthorized logins, he configured his Facebook account
part of its digital infrastructure upgrade program. This meant that some of the servers settings in a way that he gets an email alert every time a new device is used to log into
which were obsolete, but in good working condition, would be sold to recover some of his account. Which setting did Jesus configure?
the costs. The company’s servers house a host of important information about the • General settings
company, which have to be protected at all times. Which activity should the company • Privacy settings
carry out in order to be sure that the data on the old server hard drives are do not pass • Security settings
on to its new owners? • Timeline settings
• Data maintenance
• Data encryption
• Data deletion
• Data destruction

Copyright © by EC-Council Copyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited. All Rights Reserved. Reproduction is Strictly Prohibited.
Secure Computer User (CSCUv2) Secure Computer User (CSCUv2)

Pre-assessment Questions Pre-assessment Questions

28. Jacob works at a law firm and is working on a high-profile criminal case involving a 31. Rachel wants to set up a cloud service for her newly formed organization. She would
prominent city politician. As he goes about his investigation, he keeps making notes on require virtual computers, networks, and storage space in her cloud service. Which of
his phone. He is worried that if his phone is stolen or lost, all the sensitive information the following cloud services suits her needs?
can fall into the wrong hands and that could lead to a disaster. What can Jacob do to § Platform as a Service (Paas)
ensure that his data is safe even of his phone gets stolen? § Software as a Service (SaaS)
• Back up his data § Disaster Recovery as a Service (DRaaS)
• Insure his phone § Infrastructure as a Service (IaaS)
• Encrypt his phone
• Enable SIM PIN 32. Which of the following terms refers to selecting messages that contain certain strings of
text or other symbols, and either discard them, or send them to another email box of
29. George was at the airport to catch a flight from London to Sydney. While waiting for his the user’s choice?
boarding call his phone died and he was charging his phone at a public charging point. § Email filtering
This was his spare phone which he only used while travelling abroad and had no data or § Preview feature
important numbers in it. This is why he never bothered to put a passcode on the phone. § Digital signature
When the boarding announcement was made, he forgot his phone and proceeded to § Hash function
board. He realized his phone was missing as soon as he boarded, but there was nothing
that he could do at that point. Since there is a no phones policy on flights, he couldn’t 33. Which of the following terms refers to interconnecting devices in a short span, generally
even borrow someone’s phone to cancel his service. After several hours when he landed within a person’s reach?
at Sydney, he immediately called his service provider from a public phone, but by that § Wireless Local Area Network (WLAN)
time, his phone had been used by someone to make a bunch of long-distance calls and § Wireless Metropolitan Area Networks (WMAN)
had amassed a huge bill. What can George do so that something like this does not § Wireless Wide Area Network (WWAN)
happen in future again? § Wireless Personal Area Network (WPAN)
• Encrypt his phone
• Enable SIM PIN 34. Which element of security guarantees that the claimed source of data is the actual
• Insure his phone origin of data?
• Back up his phone § Authenticity
§ Confidentiality
30. Which of the following terms refers to an action taken in advance to protect the system § Integrity
against threats or danger? § Availability
§ Precaution
§ Availability 35. Which element of security guarantees that data is in its original form, is reliable,
§ Reaction complete, and has not been tampered with?
§ Maintenance § Authenticity
§ Confidentiality
§ Integrity
§ Availability

Copyright © by EC-Council Copyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited. All Rights Reserved. Reproduction is Strictly Prohibited.
Secure Computer User (CSCUv2) Secure Computer User (CSCUv2)

Pre-assessment Questions Pre-assessment Questions

36. Which of the following terms refers to the process of comparing current state of a 40. Which of the following terms refers to a data backup procedure that records data
stored file to a previously recorded state to determine if the files has been changed changes that have occurred since the most recent full back up?
since the time it was last recorded? § Online backup
§ Scanning § Differential backup
§ Heuristics § Incremental backup
§ Inoculation § System image backup
§ Integrity checking
41. Which of the following terms refers to a spyware detection and combat software that is
37. Which of the following terms refers to files that record users’ browsing history and are built into the Windows operating system?
stored locally on their computers? § Windows Defender
§ Cookies § Windows Firewall
§ Extensions § Windows Updates
§ ActiveX § Task Manager
§ Java
42. Which of the following cloud architecture is set up and used for a single entity or
38. Janine received an email, which looked like it was sent from her favorite social organization?
networking site. The email requested her to click the link present in the mail to confirm § Public cloud
her login credentials, otherwise her account would be deactivated. Fearing for the § Private cloud
deactivation of her account, Janine clicked the link. The link took her to a web page that § Hybrid cloud
seemed to be a part of the social networking site. She entered her login credentials and § Community cloud
received a supposed confirmation regarding the details of her account. A couple of days
later she realized that her account had been hacked as some personal pictures of her 43. Which of the following types of encryption makes use of a public and a private key for
were missing from the social networking site. Which cyber-attack was Janine a victim the encryption and decryption of a message?
of? § Symmetric encryption
§ Nigerian scam § Hashing encryption
§ Identity theft § Asymmetric encryption
§ Clickjacking § Database encryption
§ URL spoofing
44. Which of the following options refers to a collection of recently accessed items, such as
39. Ron forgot his Facebook login credentials and got locked out of it. He contacted his files, folders, or websites, organized by the program which was used to open them?
friend, Jess, who helped Ron log into his Facebook account again. Which Facebook § BitLocker
feature did Ron use to gain access to his Facebook account again? § Encrypting File System
§ Trusted contacts § Task Manager
§ Restricted list § Jump Lists
§ Ads and friends
§ Login alerts

Copyright © by EC-Council Copyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited. All Rights Reserved. Reproduction is Strictly Prohibited.
Secure Computer User (CSCUv2) Secure Computer User (CSCUv2)

Pre-assessment Questions Pre-assessment Questions

45. Which of the following Facebook feature allows users to disable their profile and 49. Which of the following methods is used to destroy data permanently?
remove their name and photo from most things they had shared on Facebook? § Deleting a file from the system and from the recycle bin
§ Limit the audience for shared posts § Overwriting the data multiple times until it becomes gibberish
§ Deactivate the account § Formatting a hard drive multiple times
§ Restricted list § Encrypting a file so that it is inaccessible
§ App settings
50. An organization recently moved all its intellectual property to a third-party cloud
46. Claire detected some suspicious activity in her Wi-Fi. When she called a service agent recently. After a few weeks of this, the cloud service provider decided to move its data
from the Wi-Fi company to identify the issue, she was told that someone was servers to a different country which was offering heavy tax breaks for cloud
piggybacking on her Wi-Fi. What is happening in this scenario? infrastructure companies. Even though this move would have no impact on the
§ Someone is blocking Claire’s Wi-Fi signal accessibility of data to its client, the client was not happy with it and was considering
§ Someone is using Claire’s Wi-Fi without her permission moving to another service provider. What issues would this relocation of servers create
§ Someone was spoofing Claire’s Wi-Fi SSID to create a clone for the client organization?
§ Someone changed Claire’s Wi-Fi password without her knowledge § Security issues
§ Privacy Issues
47. Which of the following terms refers to the practice of remotely storing data or running § Limited accessibility issues
applications on a network of internet servers? § Support issues
§ Cloud computing
§ Online data backup
§ Virtualization
§ Electronic vaulting

48. Gary works as a network admin at an organization that depends upon an intranet for
the transfer of information. From a past couple of days, Gary has been meeting with a
girl, Lucy, for lunch, who has been taking a keen interest in his work. Lucy seems
fascinated by what Gary does and asked if she could show her around the server room.
In hopes of impressing Lucy, he takes her back to his office. He was giving her a tour of
the server room when Lucy excused herself for a few minutes to go to the ladies’ room.
She returned a few minutes later and said that she had got an urgent phone call and she
was needed at work, but promised to meet him the day after at lunch. However, the
next day Gary was asked to leave the organization as some critical information had been
stolen from the server room, and his access card had been used to swipe in. Which form
of attack was Gary a victim of?
§ Pretexting
§ Phishing
§ Social engineering
§ Baiting

Copyright © by EC-Council Copyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited. All Rights Reserved. Reproduction is Strictly Prohibited.

You might also like