Professional Documents
Culture Documents
The Windows backup utility encrypts the data to protect it from external
attacks and decrypts it only if certain procedures are followed.
The Windows backup utility allows data safety only for the files and
folders that have been modified recently.
The Windows backup utility destroys the original copies after a backup
of the data has been created.
Firewall software
Anti-spyware software
Anti-virus software
Cloud storage
Data mining
Data base program
Offsite data storage
Bluejacking
Bluesniping
Bluesnarfing
War Nibbling
Some of the more common threats to wireless networks include
eavesdropping, data interception and modification, denial-of-service,
spoofing, etc. Identify the attack where an attacker gains access to the
wireless network by masquerading as a legitimate user.
Spoofing
Denial-of-service
SSID hijacking
Sniffing
Symbian
Android
Windows
PCI DSS is a set of guidelines, measures, and controls that were
established to support merchants, implementing tough security
defences to ensure safe credit card usage and secure information
storage. Of the following, choose the one that does not belong to PCI
DSS objectives.
Functional Backup
Normal Backup
Incremental Backup
Differential Backup
Worm
Trojan
Virus
Spyware
Phishing
Cyber Squatting
Identity Theft
Eavesdropping
Which of the following is the best option to secure your data even
when your mobile device is lost?
Using encryption
*#06#
#*06*
*06*#
#06#*
Which of the following is one of the key features found in a worm but
not seen in a virus?
Lilly is working as a CRM associate with a large MNC. She has recently
joined the organization and was not aware of security issues. One day
she left her computer unattended and went for a coffee break. After
coming back to her system she discovered that someone has deleted
a very important file placed on the desktop she was working on. Which
of the following is the best option she should have used to protect her
computer when she left for the break?
Tag Number
PIN Number
SIM Number
IMEI Number
Data Storage
Data Encryption
Data Backup
Data Restoration
FERPA
PIPEDA
HIPAA
PCI DSS
For the safety of you and your family, there is some information that
you should never post on Facebook.
Which of the following information IS safe to reveal on Facebook?
Both a and b
While surfing a website, which of the following will you check to
ensure that the site is authentic?
Encrypted Password
Biometrics
Tokens
Access cards
Passwords
Physical Security
User Security
Application Security
Network Security
Make sure to log off after accessing an Internet Banking account. This
is sufficient to protect your computer
Session splicing
Salami slicing
Remove the batteries when not in use and keeping them separately
from the laptop
Installing an antivirus
You receive an email requesting you to send your email login details
so that the management can continue to serve your mailbox size
needs. How do you respond to this request?
Hash Functions
Stream Ciphers
Phishing
Password cracking
It is not a threat
Sniffing
A store employee during a customer’s payment transaction, swipes
the debit card in an unauthorized device (apart from the store’s
payment swiping machine) that copies and saves the card information.
A month later, the store employee makes a counterfeit card using the
stolen card information and withdraws all the cash linked to that
card’s account. Identify the type of card fraud discussed in this
scenario.
Chargeback fraud
Use a webserver
HTTPS Protocol
POP3 Protocol
SMTP Protocol
NTFS file system provides better performance and security for data on
hard disks. What best describes the function of the following
command “drive_letter: /fs:ntfs”
Corporate Authority
NSA Authority
Certificate Authority
ICANN Authority
You unknowingly responded to the email requesting for your login
credentials. What would be your next step?
You approach an expert to solve the issue after you realize that
something had gone wrong
You will not reveal the truth as it may negatively impact your reputation
Rootkit
Adware
Virus
Trojan
Trojan virus
Cavity virus
Macro virus
Family Education Rights and Privacy Act (FERPA) gives certain rights
to parents with respect to their children’s educational records. These
rights transfer to the student when he/she attains age of 18 or an
education beyond the high-school level. Which one of the following
Rights is NOT granted under FERPA?
Steve receives an e-mail from his bank that mentions about updating
its customer databases and their personal information. As part of the
updating initiative, the bank requests personal information such as
Social Security numbers, credit card information, usernames, and
passwords from their customers through that email.
What should Steve do in this situation?
Steve should visit web link given in the email to login to his account
and provide required information
Steve should reply the email with the required information
Steve should check if the email is from the bank’s mail ID or not and
then decide to reply
Data Abstraction
Synchronization
Encryption
Authentication
Stealth sites
Cyber bullyingore
Child pornography
Grooming
Which of the following data backup strategies will consume the
maximum disk space?
Search engines index web pages using certain variables that are
submitted during a web page design or the search engine optimization
process. When a user searches for webpages using his keywords, the
search engine displays resulting webpages (with those stuffed
variables) that match his keywords. Those variables are called
_______________
Categorical variables
Meta variables
Dependent variables
Discrete variables
Session hijacking
Social engineering
Facebook defacement
Social engineering
Impersonation
Blackmailing
Cyber bullying
What is a “backdoor”?
Privacy settings
Security settings
Notifications Settings
Spyware
Trojan horse
Logic bomb
Worm
Hash Function
Symmetric Encryption
Priority Encryption
Asymmetric Encryption
Attack
Token
Threat
Vulnerability
Bluesnipping
Bluetooth hacking
War nibbing
Bluejacking
Shoulder surfing
Eavesdropping
Dictionary Attack
Windows Defender
Windows Firewall
Windows BitLocker
Modems
Transceiver
Hub/Switch
SMTP Protocol
HTTP Protocol
ICMP Protocol
POP3 Protocol