Professional Documents
Culture Documents
Module V--Quiz
Cyber Security
Points: 18/18
1. Student Name
PIYUSH ANEJA
2. Enrollment no
A12405218001
3. Section *
7CSE13X
*
(1/1 Point)
a). cybersecurity as the set of principles and practices designed to protect our
computing resources
https://forms.office.com/Pages/ResponsePage.aspx?id=dqBGjZPQbUGle4aSzeE7-NDve3kZdftDrT9Vd0oG9GxUNklZOUdUOENaUFhYWDU0R1… 1/8
11/8/21, 4:35 PM Module V--Quiz
b). cybersecurity as the set of principles and practices designed to protect our
online information against threats
*
(1/1 Point)
a) Authorization
b) Authentication
c) Confirmation
6. As an information systems security manager (ISSM), how would you explain the
purpose
b) A set of brief, high-level statements that defines what is and is not permitted
during the operation of the system
d) A listing of tools and applications that will be used to protect the system
(1/1 Point)
https://forms.office.com/Pages/ResponsePage.aspx?id=dqBGjZPQbUGle4aSzeE7-NDve3kZdftDrT9Vd0oG9GxUNklZOUdUOENaUFhYWDU0R1… 2/8
11/8/21, 4:35 PM Module V--Quiz
8. As a security manager, how would you explain the primary goal of a security
awareness
9. Which statement below most accurately reflects the goal of risk mitigation?
(Information
(1/1 Point)
a) Defining the acceptable level of risk the organization can tolerate, then
reduce risk to that level.
b) Analyzing and removing all vulnerabilities and threats to security within the
organization.
c) Defining the acceptable level of risk the organization can tolerate, and assigning
any costs associated with loss or disruption to a third party such as an insurance
carrier.
10. A bank suffers loss due to adverse market movement of a security. The
security was however held beyond the defeasance period. What is the
type of the risk that the bank has suffered ?
(1/1 Point)
a) Market Risk
https://forms.office.com/Pages/ResponsePage.aspx?id=dqBGjZPQbUGle4aSzeE7-NDve3kZdftDrT9Vd0oG9GxUNklZOUdUOENaUFhYWDU0R1… 3/8
11/8/21, 4:35 PM Module V--Quiz
b) Operational Risk
d) Credit Risk
11. The kind of crime involves altering raw data just before the computer processes
it and then changing it back after the processing is completed_____
(1/1 Point)
a. Data diddling
b. Data tampering
c. Salami attacks
d. None of above
12. Which type following UNIX account provides all types of privileges and rights
which one can perform administrative functions?
(1/1 Point)
Client
Guest
Root
Administrative
a). LDAP
b). TCP
c). SQL
https://forms.office.com/Pages/ResponsePage.aspx?id=dqBGjZPQbUGle4aSzeE7-NDve3kZdftDrT9Vd0oG9GxUNklZOUdUOENaUFhYWDU0R1… 4/8
11/8/21, 4:35 PM Module V--Quiz
d). HTTP
A : LC4
B : Weblnspect
C : Ettercap
D : QualysGuard
15. 1. Which one of the following items is not commonly found in an
information security governance framework?
(1/1 Point)
a. Security guidelines
b. Security standards
c. Security policies
d. Security strategies
A. Gmail
B. Read notify
C. Self distracting
D. Spy pin
(1/1 Point)
B. Shoulder surfing
C. Dumpster diving
D. Phishing
18. Having individuals provide personal information to obtain a free offer provided
through the internet is considered what type of social engineering?
(1/1 Point)
A : Web-based
B : Human-base
C : User-based
D : Computer-based
(1/1 Point)
(1/1 Point)
a) Database hacking
b) Data deletion
https://forms.office.com/Pages/ResponsePage.aspx?id=dqBGjZPQbUGle4aSzeE7-NDve3kZdftDrT9Vd0oG9GxUNklZOUdUOENaUFhYWDU0R1… 6/8
11/8/21, 4:35 PM Module V--Quiz
c) Data tampering
d) Data leakage
(1/1 Point)
22. Which of the following information security technology is used for avoiding
browser-based hacking?
(1/1 Point)
a) Anti-malware in browsers
(1/1 Point)
a) Bug
b) Threat
c) Vulnerability
d) Attack
This content is created by the owner of the form. The data you submit will be sent to the form owner. Microsoft is
not responsible for the privacy or security practices of its customers, including those of this form owner. Never give
out your password.
https://forms.office.com/Pages/ResponsePage.aspx?id=dqBGjZPQbUGle4aSzeE7-NDve3kZdftDrT9Vd0oG9GxUNklZOUdUOENaUFhYWDU0R1… 8/8