You are on page 1of 6

EMERSON EDUCATION

CYBER SECUTY FOUNDATION TEST


Answer ALL questions.
Answer EACH question on this paper.
Friday, December 4, 2020
TIME: 1HR 30Min

STUDENT NAME: _____________________________________

STUDENT ID: _____________________________________


1)Trojans Are otherwise known as.

o Backdoors
o Troy
o Virus
o worm

2)To restrict visiting Internet sites,you can modify the setting of your

o Operating system
o ISP
o Web browser
o Modem

3)choose the correct statement from the following.

o A personal firewall protects system from Internet attacks to a certain extent


o An antivirus eliminates the need for a firewall
o A personal firewall will check all email attachments for malware
o An Antivirus is not needed when a firewall filters all ports

4)which of the following statements is wrong regarding good password management?

o Do not share your password


o Do not write down your passwords
o Do not use easily guessable password
o Do not change password frequenty

5)choose the correct statement

o Threat is a potential violation of security


o Threat is a defined way to breach security through a vulneability
o Threat is the existence of weakness or implementation error
o Threat is an assault on system security

6)A strong password will be a combination of

o Letters only
o Numbers only
o Letters in caps and small forms
o Letters,numbers and special characters

7)Which of he following would you consider as a good password?

o Beatle Juices
o Lms#456JKZX8
o 13Locksmith
o JamesBrown
8)What are the three most common risk associated with “surfing the Web(select 3 answer)

o Theft of credit card information


o Theft of personal identify and other private information
o Overloading computer system resources
o Contamination by a virus or other malicious code

9)Name the attack where a person is tricked into disclosing information

o Backdoors
o Keylogging
o Time bomb
o Social Engineering

10)A ‘Private’ folder in windows is

o A folder that is not shared


o A private shared folder
o An encrypted folder
o A hidden folder

11)In asymmetric encryption

o Similar key are used


o Two public keys are used
o Two private keys are used
o A public and private key is use

12)Which of the following option would you choose to secure e-mail messages?

o Digital signature
o Digital voice
o Digital autograph
o Digital photograph

13)What is a ‘cookies’?(select 2 answer)

o A cookie is a dynamic link library loaded when windows start


o A cookie is a file encryption utility
o A cookie is spyware program
o A cookie is a file created by an Internet site to store information on your computer

14)A guest account should be

o Given executable rights


o Used for administrator alone
o Preferably disabled
o Created as a separate login
15)Security is a

o A snapshot of a system in time


o One time imitative
o Ongoing process
o Theoretical concept

16)choose the correct statement

o The skill level needed to conduct an exploit has decreased


o Evolution of technology did little to increase ease of use
o Security is only a one stage process
o Software flaws can be absolutely eliminated

17)Denial of service occurs when

o Illegitimate users are prevented from using resources


o Legitimate users are denied access to resources
o ISPS notify a down time to users
o An organization denies access to certain sites

18)What should you do if you receive a call from someone in your computer support department
asking for your password?

o Give it to them without question


o Inform them that there is no reason they should need your password and refuse to give it to
them
o Ask them why they need the password. If the reason sounds legitimate, go a head and give
o Send the password via e-mail to ensure you’re giving it to the right person

19)Working away from the office gives you are more freedom to disregard your company’s security
standards and policies.(True or False)

o True
o False

20)Which key combination in windows will lock your workstation?

o Ctrl+shift+del
o [windows key]+L
o Alt+shift+Del
o Alt+shift+ctrl

21)To verify if your are on a secure page, you will check for

o http:// in the url and padlock sign on the page


o http:// in the url and padelock sign on the page
o http:// in the url and handlock sign on the page
o https:// in the url and handlock sign on the page
22)While using peer network which of the following precautions would you use?

o Use a reliable client software


o You can safely transmit password in public network
o Share files and folder selectively
o Scan all downloaded file using av software

23)Which option will you choose to share file more security?

o FTP sites
o HTTPS sites
o Share you root drive
o PQP network

24)This tool can capture password when types from the keyboard

o Eavesdropper
o Keylocker
o Enterapper
o Keylogger

25)Computer virus are most commonly spread by?

o Choosing weak computer passwords


o Opening e-mail attachments
o Downloading pictures from web
o Reading jokes on the Internet

26)Which of the following statements are wrong in the context of “downloading” files?

o It is safe to open a file or run a program directly from a location


o Never save the file in the root directory of the computer
o Before opening the file, save all other work and close other programs
o Files must be scanned for viruses/Malware prior to using them

27)Which of the following is the best example of a strong password?

o Password(a word that substitutes numbers for some of the letters


o pateR%office3 (a name or phrase that mixes uppercase and lowercase letters, numbers and
symbols)
o good2go(a phrase the mixes letters and numbers)
o Dadl969(something easy to remember like a name and birth date)

28)Which command displays all Current TCP/IP network configuration values?(select 2 answer)

o IPconfig
o Netstat
o Ping
o Netconfig
29)While using peer to peer networks which of the following precautions should you use??

o You can safely transmit password in PQP network


o Scan all downloaded file using AV software
o Use a reliable client software
o Share files and folder selecting

30)when you login to your computer, you

o Identify and authenticate


o Identify and authorize
o Authenticate and validate
o Authenticate and reinforce

31)Which of the following statements are false?

o Encryption involves protecting a file by hiding them into another file or message so that only
authorized users can access the file
o Authenticity of all files downloaded from third party sources cannot be trusted
o File integrity can be checked by using MD5 check sum
o All application can be identified by using a task manager

32)choose the correct statement from the following

o A person firewall will check all e mail attachment for malware


o An antivirus eliminates the need for a firewall
o An antivirus is not needed when a firewall filters all port
o A personal firewall protects system from Internet attacks to a certain extends

33)If you had secure a folder completely, which option will you choose?

o Rename the folder


o Hide the folder
o Zip the folder
o Encrypt the folder

34)While using peer to peer networks which of the following precautions would you use?

o You can safely transmit passwords in PQP networks.


o Scan all downloaded files using AV software
o Use a reliable client software
o Share files and folder selection

35)When you login to your computer, you

o Identify and authentication


o Identify and authorize
o Authenticate and validate
o Authentication and reinforc

You might also like