You are on page 1of 15

Secure Computer User (CSCUv2)

Pre-assessment Questions

EC-Council
Secure Computer User

Pre-aAsessment Questions

Copyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited.


Secure Computer User (CSCUv2)

Pre-assessment Questions

1. Which of the following elements of security refers to ensuring that information is


accurate, complete, reliable, and is in its original form?
• Confidentiality
• Authenticity
• Availability
• Integrity

2. Which of the following terms refers to processed data?


• Phished
• Authentic
• Information
• Nonrepudiated

3. Which of the following terms refers to the act of accessing someone’s information
without his or her knowledge?
• Phishing
• Hacking
• Social engineering
• Bluesnarfing

4. Which of the following terms refers to a Windows security feature, which prevents
unauthorized users from accessing a computer?
• Control panel
• User Account Control
• Encrypting File System (EFS)
• Task manager

5. Which of the following terms refers to allowing a user to bypass the login functionality
by restarting the system, in Mac OS X?
• App downloads
• Software updates
• Guest account
• Automatic login

Copyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited.


Secure Computer User (CSCUv2)

Pre-assessment Questions

6. Jack recently purchased a new laptop. In order to keep his laptop secure, he installed
antivirus software on it. However, he does not know whether the antivirus software is
working. Which test should he perform to check whether the antivirus is working?
• EICAR test
• Power-on self-test
• Integration test
• Black box test

7. Amy, a school-going girl was researching the White House for a school project.
Whenever she tried visiting the White House website, she ended up landing at the same
pornographic website. Concerned about the matter, she wrote an email to the White
House informing them that pornographic content was being displayed on the site. In a
reply to her email, White House officials assured her that they had thoroughly checked
the site and found no such content. When Amy tried to access the site again, to her
frustration she ended up at the same porn site.
What could be the reason for Amy to repeatedly keep landing at the pornographic
website?
• Spam
• Bluesnarfing
• Insufficient transport layer protection
• Malicious redirection

8. Andrew, a senior associate at the XZ law firm, is reviewing sensitive documents on


behalf of a client for a high profile case. After working for several hours straight
reviewing documents, he takes a coffee break and heads out to the local coffee house.
After ordering coffee, Andrew logs on to the coffee shop Wi-Fi. He begins working on
the document repository online. Once his work is finished, he pays his bill and leaves for
home. The next day, the Internet is flooded with trade secrets of his client, and
obviously, Andrew is held responsible for it as he was the only one who had access to
the information. Andrew is perplexed as to how the data theft occurred, especially
when he had security measures in place. What could have caused the data theft?
• Usage of public Wi-Fi
• Phishing
• Spam
• Configuration problems

Copyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited.


Secure Computer User (CSCUv2)

Pre-assessment Questions

9. Which of the following terms refers to a list of friends, who can help users to login into
their Facebook account if they forget their password?
• Restricted list
• Profile settings
• Trusted contacts
• Tagging

10. Which of the following terms refers to a hacking technique, which employs the process
of creating a fake URL mimicking the legitimate one?
• Site flaws
• Evil twin
• Phishing
• URL spoofing

11. Jason likes spending his free time on social networking sites, especially Facebook. One
day while he was on Facebook, he clicked a link whose title was “You’ll never believe
what this six-year-old found in his Happy Meal”. Then he liked the Facebook page that
had shared the link. Later, when he logged into his profile again, he noticed that his
Facebook Wall was cluttered with spam, and links from the page he had liked had been
shared with his friends.
Which Internet attack was Jason a victim of?
• Social engineering
• Evil twin
• Likejacking
• Bluesnarfing

12. Jessica, an 18-year-old girl, regularly posts her selfies on Facebook. Recently some
strangers have been posting lewd comments on her photos. These comments are
upsetting Jessica and she wants them to stop.
Which Facebook setting should Jessica enable to prevent strangers from viewing her
photos?
• Deactivate account
• Restricted list
• Where you're logged in feature
• Who can see my stuff feature

Copyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited.


Secure Computer User (CSCUv2)

Pre-assessment Questions

13. Sharon received the following email from an unknown person:


Dear Friend,
I am a Senior Account Manager of XYZ Bank. My name is George Bitts. I was personal
account manager to the CEO of a reputed steel company in Europe. He and his family
died in air crash, while visiting Canada, five years back. Since then, I have enquired
about his next kin, but my attempts are useless. Recently our bank decided that it would
keep the CEO’s $45 million if no kin is found.
Hence, I am requesting you to help me in getting this amount before the bank keeps it. I
wish to present you before the bank official as the CEO’s next kin, so that this huge
amount will be transferred to your account. Once the transfer is complete, the funds
would be shared between us.
If you are interested in this deal, please respond immediately to this email.
Regards,
George Bitts
Which type of email security threat is this?
• Nigerian scam
• Spam
• Phishing
• Spy-phishing

14. Rita’s phone was stolen from her when she was in the bus returning home from visiting
her sister. When she went to her service provider to block the SIM, the assistant there
told her about a sequence of numbers, which is located near the battery in a phone. The
assistant proceeded to tell Rita that this number is used to identify a mobile device. It
also can be used to remotely disable or blacklist a stolen phone.
Which number was the assistant talking about?
• International Mobile Subscriber Identity (IMSI)
• International Mobile Station Equipment Identity (IMEI)
• Mobile Equipment Identifier (MEID)
• Electronic Serial Numbers (ESNs)

Copyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited.


Secure Computer User (CSCUv2)

Pre-assessment Questions

15. Cameroon always keeps his phone’s Bluetooth on and in discoverable mode despite
being warned about it. He gets a few pairing requests a day but he always accepts them
without verifying since most of the times it is his neighbors who want to share pictures
with him. Mitch, one of Cameroon’s friends, owes him $500. Cameroon just got a text
from Mitch asking him for his account number so that he could transfer the money
online. Cam texted Mitch his account number and within a few minutes got a reply text
from Mitch saying that he had transferred the amount. Cameroon checked his account
but could not see the money from Mitch. When he called Mitch, he confirmed that he
had transferred the money to account # 0012548785875 whereas Cameroon’s account
number was #002154789247. Mitch immediately came over and showed Cameroon the
text he had received from him, which said that the account number was
0012548785875.
Which attack was Cameroon most probably a victim of in this scenario?
• Man in the middle attack
• Backdoor hacking
• Phishing
• Bluesnarfing

16. A five-year old finance company was looking for a cloud computing platform to test the
efficiency of its data and recently developed applications. The company wanted its data
and applications to be accessible only by its employees due to security concerns.
Which of the following type of cloud computing platforms would be a best choice for
the finance company?
• Private cloud
• Public cloud
• Community cloud
• Hybrid cloud

17. Claire is a fashion designer by profession. Recently some of her designs were stolen
along with her laptop and after a few days, some other designer came up with a
collection that was originally hers. To prevent this from happening again, she decided to
store all her designs on a cloud henceforth. She is looking for a cloud service which
would suit her needs. Which aspect of the cloud service’s terms and conditions should
she pay most attention to?
• Data location
• Data ownership
• Data migration
• Data permanency

Copyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited.


Secure Computer User (CSCUv2)

Pre-assessment Questions

18. Christie is a DJ by profession. She regularly mixes new tracks and releases them online
on her channel. She is about to go on vacation to the Caribbean where she intends to
find inspiration on the sunny beaches and come up with some new original music. She
does not want to carry more than required memory storage sticks with her as she
intends to move around a lot and fears that she may lose some of the memory sticks,
along with her music, in transit. Thus, she requested some additional space from her
current cloud service provider so that she can upload her tracks on the cloud that will
eliminate the need to carry extra memory sticks. Which particular advantage of a cloud
service helped Christie out in her situation?
• Cost effective
• Portability
• Flexibility
• Reliability

19. Which type of cloud caters to a group of organizations who share the same interests?
• Private cloud
• Public cloud
• Community cloud
• Hybrid cloud

20. John recently set up a wireless network at his home. To avoid eavesdropping on his
personal communication, John implemented a secure method of data communication.
He used WPA2( Wi-Fi Protected Access 2) to secure his home network from intruders.
Which of the following methods of securing his network did John employ?
• Authentication
• Certification
• Encryption
• Authorization

Copyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited.


Secure Computer User (CSCUv2)

Pre-assessment Questions

21. Karen is a student who frequently visits the coffee house next to her dorm as it has free
Wi-Fi. Karen always connects to the Wi-Fi named Cup2, but during her latest visit she
noticed two Wi-Fi signals with the same name. She did not pay too much attention to it
though and logged on to the first signal that showed up on her laptop. The following day
Karen noticed that $2000 was transferred from her online bank account to an unknown
account. She was certain that she did not make any such transfer and had not revealed
any of her bank details to anyone over the internet or otherwise.
Which of the following threats to wireless networks could have been behind Karen’s
situation?
• Evil twin
• Configuration problem
• Encryption problems
• Virus attack

22. What is the most secure encryption method for home wireless network?
• WEP
• WPA
• WPA2
• WAP2

23. Which prefix to a website name symbolizes that the site is using a secured connection?
• https//
• https://
• https:\\
• https\\
24. ABC Info Ltd. is installing new servers in its offices with larger hard drive capacities as
part of its digital infrastructure upgrade program. This meant that some of the servers
which were obsolete, but in good working condition, would be sold to recover some of
the costs. The company’s servers house a host of important information about the
company, which have to be protected at all times. Which activity should the company
carry out in order to be sure that the data on the old server hard drives are do not pass
on to its new owners?
• Data maintenance
• Data encryption
• Data deletion
• Data destruction

Copyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited.


Secure Computer User (CSCUv2)

Pre-assessment Questions

25. Ellen just received her new driver’s license and noticed that all her details on it were
correct apart from her picture. The picture was that of a man whom she did not know.
She brought this to the notice of the DMV officials. Upon investigation, they realized
that the computer was selecting the wrong pictures to add to the licenses of women
applicants specifically. Ellen had to ultimately get her picture taken once again to get a
correct driving license.
Which of the following best describes the above issue?
• Software failure
• Human error
• Hardware failure
• Natural disaster

26. Josh just finished his coffee at a coffee shop with his friends and booked a cab through
an app on his phone to go home. The app showed that his cab would arrive at his
location in 10 minutes. To kill some time, he clicked a few pictures of him and his friends
and posted them online. Karen, one of his friends, checked his post and after a bit of
digging deeper within minutes she could determine exactly where Josh was at that
moment. Which feature helped Karen determine Josh’s location?
• Pinpointing
• Geotagging
• Mapping
• Streaming

27. Jesus keeps logging into his Facebook account from multiple devices and it is getting
difficult for him to keep track of all the devices he uses to log in. To keep his account
secure and not allow any unauthorized logins, he configured his Facebook account
settings in a way that he gets an email alert every time a new device is used to log into
his account. Which setting did Jesus configure?
• General settings
• Privacy settings
• Security settings
• Timeline settings

Copyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited.


Secure Computer User (CSCUv2)

Pre-assessment Questions

28. Jacob works at a law firm and is working on a high-profile criminal case involving a
prominent city politician. As he goes about his investigation, he keeps making notes on
his phone. He is worried that if his phone is stolen or lost, all the sensitive information
can fall into the wrong hands and that could lead to a disaster. What can Jacob do to
ensure that his data is safe even of his phone gets stolen?
• Back up his data
• Insure his phone
• Encrypt his phone
• Enable SIM PIN

29. George was at the airport to catch a flight from London to Sydney. While waiting for his
boarding call his phone died and he was charging his phone at a public charging point.
This was his spare phone which he only used while travelling abroad and had no data or
important numbers in it. This is why he never bothered to put a passcode on the phone.
When the boarding announcement was made, he forgot his phone and proceeded to
board. He realized his phone was missing as soon as he boarded, but there was nothing
that he could do at that point. Since there is a no phones policy on flights, he couldn’t
even borrow someone’s phone to cancel his service. After several hours when he landed
at Sydney, he immediately called his service provider from a public phone, but by that
time, his phone had been used by someone to make a bunch of long-distance calls and
had amassed a huge bill. What can George do so that something like this does not
happen in future again?
• Encrypt his phone
• Enable SIM PIN
• Insure his phone
• Back up his phone

30. Which of the following terms refers to an action taken in advance to protect the system
against threats or danger?
 Precaution
 Availability
 Reaction
 Maintenance

Copyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited.


Secure Computer User (CSCUv2)

Pre-assessment Questions

31. Rachel wants to set up a cloud service for her newly formed organization. She would
require virtual computers, networks, and storage space in her cloud service. Which of
the following cloud services suits her needs?
 Platform as a Service (Paas)
 Software as a Service (SaaS)
 Disaster Recovery as a Service (DRaaS)
 Infrastructure as a Service (IaaS)

32. Which of the following terms refers to selecting messages that contain certain strings of
text or other symbols, and either discard them, or send them to another email box of
the user’s choice?
 Email filtering
 Preview feature
 Digital signature
 Hash function

33. Which of the following terms refers to interconnecting devices in a short span, generally
within a person’s reach?
 Wireless Local Area Network (WLAN)
 Wireless Metropolitan Area Networks (WMAN)
 Wireless Wide Area Network (WWAN)
 Wireless Personal Area Network (WPAN)

34. Which element of security guarantees that the claimed source of data is the actual
origin of data?
 Authenticity
 Confidentiality
 Integrity
 Availability

35. Which element of security guarantees that data is in its original form, is reliable,
complete, and has not been tampered with?
 Authenticity
 Confidentiality
 Integrity
 Availability

Copyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited.


Secure Computer User (CSCUv2)

Pre-assessment Questions

36. Which of the following terms refers to the process of comparing current state of a
stored file to a previously recorded state to determine if the files has been changed
since the time it was last recorded?
 Scanning
 Heuristics
 Inoculation
 Integrity checking

37. Which of the following terms refers to files that record users’ browsing history and are
stored locally on their computers?
 Cookies
 Extensions
 ActiveX
 Java

38. Janine received an email, which looked like it was sent from her favorite social
networking site. The email requested her to click the link present in the mail to confirm
her login credentials, otherwise her account would be deactivated. Fearing for the
deactivation of her account, Janine clicked the link. The link took her to a web page that
seemed to be a part of the social networking site. She entered her login credentials and
received a supposed confirmation regarding the details of her account. A couple of days
later she realized that her account had been hacked as some personal pictures of her
were missing from the social networking site. Which cyber-attack was Janine a victim
of?
 Nigerian scam
 Identity theft
 Clickjacking
 URL spoofing

39. Ron forgot his Facebook login credentials and got locked out of it. He contacted his
friend, Jess, who helped Ron log into his Facebook account again. Which Facebook
feature did Ron use to gain access to his Facebook account again?
 Trusted contacts
 Restricted list
 Ads and friends
 Login alerts

Copyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited.


Secure Computer User (CSCUv2)

Pre-assessment Questions

40. Which of the following terms refers to a data backup procedure that records data
changes that have occurred since the most recent full back up?
 Online backup
 Differential backup
 Incremental backup
 System image backup

41. Which of the following terms refers to a spyware detection and combat software that is
built into the Windows operating system?
 Windows Defender
 Windows Firewall
 Windows Updates
 Task Manager

42. Which of the following cloud architecture is set up and used for a single entity or
organization?
 Public cloud
 Private cloud
 Hybrid cloud
 Community cloud

43. Which of the following types of encryption makes use of a public and a private key for
the encryption and decryption of a message?
 Symmetric encryption
 Hashing encryption
 Asymmetric encryption
 Database encryption

44. Which of the following options refers to a collection of recently accessed items, such as
files, folders, or websites, organized by the program which was used to open them?
 BitLocker
 Encrypting File System
 Task Manager
 Jump Lists

Copyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited.


Secure Computer User (CSCUv2)

Pre-assessment Questions

45. Which of the following Facebook feature allows users to disable their profile and
remove their name and photo from most things they had shared on Facebook?
 Limit the audience for shared posts
 Deactivate the account
 Restricted list
 App settings

46. Claire detected some suspicious activity in her Wi-Fi. When she called a service agent
from the Wi-Fi company to identify the issue, she was told that someone was
piggybacking on her Wi-Fi. What is happening in this scenario?
 Someone is blocking Claire’s Wi-Fi signal
 Someone is using Claire’s Wi-Fi without her permission
 Someone was spoofing Claire’s Wi-Fi SSID to create a clone
 Someone changed Claire’s Wi-Fi password without her knowledge

47. Which of the following terms refers to the practice of remotely storing data or running
applications on a network of internet servers?
 Cloud computing
 Online data backup
 Virtualization
 Electronic vaulting

48. Gary works as a network admin at an organization that depends upon an intranet for
the transfer of information. From a past couple of days, Gary has been meeting with a
girl, Lucy, for lunch, who has been taking a keen interest in his work. Lucy seems
fascinated by what Gary does and asked if she could show her around the server room.
In hopes of impressing Lucy, he takes her back to his office. He was giving her a tour of
the server room when Lucy excused herself for a few minutes to go to the ladies’ room.
She returned a few minutes later and said that she had got an urgent phone call and she
was needed at work, but promised to meet him the day after at lunch. However, the
next day Gary was asked to leave the organization as some critical information had been
stolen from the server room, and his access card had been used to swipe in. Which form
of attack was Gary a victim of?
 Pretexting
 Phishing
 Social engineering
 Baiting

Copyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited.


Secure Computer User (CSCUv2)

Pre-assessment Questions

49. Which of the following methods is used to destroy data permanently?


 Deleting a file from the system and from the recycle bin
 Overwriting the data multiple times until it becomes gibberish
 Formatting a hard drive multiple times
 Encrypting a file so that it is inaccessible

50. An organization recently moved all its intellectual property to a third-party cloud
recently. After a few weeks of this, the cloud service provider decided to move its data
servers to a different country which was offering heavy tax breaks for cloud
infrastructure companies. Even though this move would have no impact on the
accessibility of data to its client, the client was not happy with it and was considering
moving to another service provider. What issues would this relocation of servers create
for the client organization?
 Security issues
 Privacy Issues
 Limited accessibility issues
 Support issues

Copyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited.

You might also like