Cybersecurity Prologue
Cybersecurity Prologue
5.________ monitors user activity on internet and transmit that information in the
background to someone else.
Spyware
7.What is PUP?
Potentially unwanted program
8.A ________ is like a Virus, having the ability to spread without any medium.
Worm
10.In Symmetric-key cryptography, the key used by the sender and the receiver is
Shared
14.UML component diagram is used to identify how a module validate &processes the
data before storing it.
False
16.Deep packet inspection can be used to give more context to indicator only.
False
19.Incidents should be handled on a first come- first serve basis and must be
prioritized based on the Business impact.
False
25.A ________ is a credit card sized card with an embedded chip, containing
information about the user
Smart card
27.Phishing emails include fake notifications from banks and e-payment systems.
True
28.As an email client, we should not use caution when opening emails and can
download any attachments.
False
31.At Strategic level threat intelligence information can be exchanged within it's
operating community
False
38.Cyber security architecture is all about understanding one's Business Scope and
requirements only.
False
39.At Operational level threat intelligence real time feed protocols are being
used.
True
40.Defining the security control parameter SLA at 98.5% for taking appropriate
actions to avoid penalty risk if it goes below 98% must be a part of
Architecture Risks
41.It is a program or hardware device that filters the information coming through
an internet connection to a network or computer system.
Cookies
42.In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt
actual messages, it is very slow if the message is.
Long --- correct
Short --- wrong
44.At Tactical level threat intelligence research analysis and reports can be
published after malware analysis.
False
48.________ are often delivered to a PC through an email attachment and are often
designed to do harm.
Virus
49.The altering of data so that it is not usable unless the changes are undone is
________
Encryption
53.A type of malware that demands a ransom if the victim wants his or her files
back is called ________
Ransomware
56.A TCS business operations team required to meet 98% SLA in FY 2017'18 to avoid
non-compliance penalty which must be a part of
Architecture requirements
60. Attack which happens due to neglected factors like compromising with security
is a type of
malicious threat ---wrong
source threat
61. Incidents should be handled on a first come-first serve basis and must be
prioritized based on the Business impact
False
cyber law
62. is the guarantee of data privacy and protection against unauthorized disclosure
Encryption ---wrong
63. The sole purpose of ________ attack, is to fool the victim and to get all the
confidential information
phising
65. A Botmaster can attack and take control of vulnerable one like
All of the above
66. Which of the following is an independent malicious program that does not need
any host program
Worm