You are on page 1of 8

‫أسئلة اختبار‬

‫أساسيات األمن السيبراني‬


Med-Term
Question 1
1 out of 1 points
The sensitivity adjustment on a biometric authentication device affects which of the following?
d. Requirement for continuous adjustment
b. False acceptance rate and false rejection rate
a. Cost of the device
c. Limitation of the enrollment database

Question 2
1 out of 1 points
Trojans do not do one of the following. What is that?
c. Modifying Data
b. Protecting Data
a. Deleting Data
d. Copying Data

Question 3
1 out of 1 points
Once _____________ hijacks your system, it might perform different sorts of unwanted tasks.
b. Banner grabbing
c. Cracking
a. Server hacking
d. Hijacking

Question 4
1 out of 1 points
In _______________ some cyber-criminals redirect the legitimate users to different phishing sites
and web pages via emails, ads and spyware.
c. Phishing
d. Website attack
b. DoS

a. URL Redirection

Question 5
1 out of 1 points
_______________ is the kind of firewall is connected between the device and the network
connecting to internet.
d. Microsoft Firewall
c. Stateful Inspection Firewall
b. Software Firewall
a. Hardware Firewall

Question 6
1 out of 1 points
Which of the below-mentioned is the phase that “Virus places a copy of itself into other
programs or into certain system areas on the disk”?
c. Dormant phase
d. Propagation phase
b. Pranks
a. Execution phase

Question 7
1 out of 1 points
Mandatory access control uses which of the following to authorize access to information?
b. Roles and rules
d. Identity and several factor authentication
a. Identity and voice prints
c. Subject and object labels

Question 8
1 out of 1 points
Using the ______ account of a UNIX system, one can carry out administrative functions.
a. root
b. administrative
d. client
c. user

Question 9
0 out of 1 points ‫حسبها لي النظام كإجابة خاطئة وهي صحيحة‬
Which of the following types of access control is preferred for its ease of administration when there
are a large number of personnel with the same job in an organization?
a. Mandatory Access Control
d. Label-based Access Control
c. Rule-Based Access Control
b. Role-based Access Control

Question 10
1 out of 1 points
Backdoors cannot be designed as ______________
c. embedded code of the firmware
a. the hidden part of a program
d. embedded with anti-malware
b. a part of Trojans

Question 11
1 out of 1 points
Which of them is not an ideal way of spreading the virus?
c. Official Antivirus CDs
b. Emails
a. Infected website
d. USBs

Question 12
1 out of 1 points
Computer security is protection of the integrity, availability, and confidentiality of information
system resources.
True

Question 13
1 out of 1 points
One advantage of Packet Filtering firewall is _______.
c. more costly
b. more complex
a. more efficient
d. Simplicity

Question 14
1 out of 1 points
Crossover error rate (CER) refers to which of the following graphical intersections?
b. Employee opt-out rate
c. Symmetric and asymmetric rate
a. Database usage rate
d. False rejection rate and false acceptance rate

Question 15
1 out of 1 points
A __________ is created by using a secure hash function to generate a hash value for a message
and then encrypting the hash code with a private key.
c. one way hash function
b. keystream
d. secret key
a. digital signature

Question 16
1 out of 1 points
_____________ are implemented to carry out distributed DDoS attacks, steal data, send spam
messages & permits the hacker to access various devices & its connection.
c. Botnet
b. Virus
a. Trojan
d. Worms

Question 17
1 out of 1 points
SQL injection is an attack in which _________ code is inserted into strings that are later passed to
an instance of SQL Server.
b. redundant
d. non malicious
c. clean
a. malicious

Question 18
1 out of 1 points
Public-key cryptography is asymmetric.
True

Question 19
1 out of 1 points
What are the three categories of controls?
d. Physical, logical (technical), and administrative
c. Administrative, logical (technical), and physical
b. Administrative, physical, and preventative
a. Physical, detective, and logical (technical)

Question 20
1 out of 1 points
Which of the following best describes privileged users?
b. They are super-users or administrators
a. They are anonymous users
c. They all must work in the IT department
d. By default have access to everything on the network

Question 21
1 out of 1 points
Infected computers and other systems within the botnet are called __________
a. killers
b. vampires
c. zombies
d. gargoyles

Question 22
1 out of 1 points
Computer security is essentially a battle of wits between a perpetrator who tries to find holes
and the administrator who tries to close them.
True

Question 23
1 out of 1 points
Once activated __________ can enable ____________to spy on the victim, steal their sensitive
information & gain backdoor access to the system.
b. malware, penetration testers
a. virus, cyber-criminals
c. trojans, cyber-criminals
d. virus, penetration testers

Question 24
0 out of 1 points ‫حسبها لي النظام كإجابة خاطئة وهي صحيحة‬
DoS is abbreviated as _______________.
d. Denial of Server
c. Distribution of Service
b. Distribution of Server
a. Denial of Service

Question 25
1 out of 1 points
An assault on system security that derives from an intelligent act that is a deliberate attempt to
evade security services and violate the security policy of a system is a(n) __________.
b. asset
c. attack
a. risk
d. vulnerability

Question 26
1 out of 1 points
__________ is the scrambled message produced as output.
a. Plaintext
c. Secret key
b. Ciphertext
d. Cryptanalysis

Question 27
1 out of 1 points
A _______________ provides malicious users remote control over the targeted computer.
d. Trojan-Downloader
c. Trojan-Banker
a. DDoS-Trojan
b. Backdoor Trojan

Question 28
1 out of 1 points
Two commands for managing SQL access rights
a. Grant & Revoke
c. Update & Delete
b. Select & Insert
d. Grant & Update

Question 29
1 out of 1 points
Backdoors are also known as ______________
d. Trapdoors
a. Malware-doors
c. Front-doors
b. Trojan-backups

Question 30
1 out of 1 points
Users might invite some bogus virus in his/her system by clicking the ___________.
c. URL
a. Shareware
b. Spyware
d. Adware

You might also like