Professional Documents
Culture Documents
Cscu Exercise Exam: Test Number: 1-50
Cscu Exercise Exam: Test Number: 1-50
EXERCISE EXAM
Test Number: 1-50
QUESTION 1
Smith receives an email from his bank informing him
that it suspects an unauthorized transaction on his
account. To protect his account, the email advises Smith
to click on a link to verify his identity and provide any
missing information in the form. Smith is a victim of:
A. Shopbot
B. Trust verification site.
C. Business rating site
D. Shopping portals
QUESTION 9
I want to request secure web pages using https://.
What port will I need to open on my firewall to
allow these SSL-encrypted packets to flow?
A. 22
B. 53
C. 80
D. 443.
QUESTION 10
Susan spends most of the time on computer working
and doing other things. Susan left her PC connected to
Internet idle for some time. An attacker, although was
not able to steal any information, remotely utilized her
PC’s processor cycles for some of his computationally
intensive task. Classify the above breach of security?
A. Disclosure of information
B. Compromising integrity of the PC.
C. Denial of service attack
D. Buffer overflow attack
QUESTION 11
Anne suspects that her husband is cheating on her. He
spends most of his time on the Internet chatting with a
woman. When questioned, he says she is a good friend and a
colleague. On suspicion, Anne contacted her friend who
happened to be a network security administrator. Upon his
instructions, Anne installed a Keylogger when her husband
was away for work. How does a Keylogger can help Anne to
know whether her husband is cheating or not?
A. It captures the voice communication of her husband
B. Captures the control panel settings
C. Captures the .pdf (PDF-Printable Document Format) files
and sends them to her as attachments
D. Captures all the keystrokes that her husband types.
QUESTION 12
Company ABC has various departments that
have developed several private resources that
can be accessed using Internet protocols. The
company ABC now wants to link these resources
together. What type of network is being described
here?
A. Internet
B. Extranet
C. Intranet.
D. Virtual private network
QUESTION 13
Nancy wants to safeguard herself and prevent her
identity from being stolen. What would you
recommend her to do before throwing away items with
personal information on them?
A. Write down the information for the records
B. Shred them or tear them up.
C. Not necessary to do anything
D. Contact the financial institution and verify her
transactions
QUESTION 14
Allen, a front office executive from Atlanta, has never
taken a backup of his system. He is worried about
security of the data in case his system crashes. Which of
the following type of backup will you suggest to Allen if
he wants to take a complete backup of his system?
A. Normal Data Backup.
B. Incremental Data Backups
C. Differential Data Backup
D. Full Incremental Data Backups
QUESTION 15
Sharon recently purchased a new smart phone for herself.
While exploring her phone, she tried to set her mobile
phone’s Bluetooth security. Sharon wants her phone’s
Bluetooth to be in default operation mode. Which among
the following options Sharon has to select to keep her
mobile in Bluetooth’s default security mode?
A. Non-secure mode.
B. Leaving security up to each application
C. Enforce link encryption for all traffic
D. Security settings default to a mobile policy server
QUESTION 16
Austin and Stuart are two brothers. Austin works for a reputed IT
firm and sometimes his job requires him to work from home
with his PC connected to the Internet. When Austin is away to
work, his brother Stuart uses his PC. Austin suspected that his
brother browses Internet frequently and watches porn on his
PC. Austin wants to quietly and automatically block all the porn
websites so that his brother does not visit them. What must
Austin do in order to block the porn websites automatically?
A. Install scanning tool to scan the system
B. Install a firewall that blocks all porn
C. Install an antivirus software and activate parental control.
D. Install a keylogger
QUESTION 17
Nick received an email promotion stating that he has
won a new car. The email asks him to deposit $40 to
the sender’s account and provide some credentials.
What will be the best course of action for Nick in this
situation?
A. qwerty
B. administrator
C. Q!56ra@G.
D. mypassword
QUESTION 24
What is the process of encoding information in a way so
that only someone with a key can decode it?
A. Compression
B. Steganography
C. Systemic variation
D. Encryption.
QUESTION 25
John used a tool to create an encrypted value similar to
"b2638eeef37069d0e697f92ae7de46a7" representing
an important file. His network administrator told him
that this value will be different every time there is a
change in the file. What is John generating in order to
check the integrity of the file?
A. Encryption algorithm
B. Hash value.
C. Encryption value
D. Decryption value
QUESTION 26
The screen below appears while you are browsing the Internet. What is the
most appropriate action you will take to keep your system secure?
A. Virus
B. Worm
C. Trojan.
D. Keylogger
QUESTION 29
Nadal, the industrialist from Norway, was travelling from
his hometown to Zurich for business purpose. On the way
his phone was stolen by a burglar. Which code Nadal may
use to deactivate his phone in order to save his personal as
well as confidential business information stored in his
phone?
A. IMEI code.
B. IEMI code
C. *#07*
D. #*07#
QUESTION 30
If you ever receive an unsolicited telephone call from
someone claiming to need your password, what would
you do?
A. HIPAA.
B. FERPA
C. PCI DSS
D. AAPIE
QUESTION 34
The following diagram shows a network device that is used for
connecting the modem to the network and determining the next network
point to which a packet should be forwarded. This device can access the
address of a network layer and can have incorporated software that
helps it identify the possible paths between the addresses and the
appropriate channels to transmit data.
A. 128-bit
B. 512-bit.
C. 256-bit
D. 192-bit
QUESTION 36
Your IP address can link your Internet activities directly to
you; it can be used to find your name and location. So
protecting your Online Identity is a must, thus Anonymous
Web Surfing and the ability to hide your IP address are
mandatory in order to ensure a high level of online protection.
Which of the following is an IP Address Hiding Tool?
A. TOR.
B. Hider IP
C. Anonymous Use
D. My IP
QUESTION 37
Which of the following will help prevent
unauthenticated access to the wireless network?
A. Bluesniping
B. Bluejacking.
C. Fuzzing attack
D. Bluesnarfing
QUESTION 49
http://www.experian.com, http://www.equifax.com, and
http://www.transunion.com are examples of credit
reporting agencies. You should contact these agencies
if suspect that your identity is stolen. These agencies
will help you in: