Cyber Security part 2
21.What is the name for a program or programming code that
replicates by being copied or initiating its copying to another program,
computer boot sector or document?
A. Spyware.
B. Virus.
C. Firewall.
D. Norton.
22. Which is a good choice in this situation?
"If someone from your bank calls you and asks you to update your personal information including bank account number and social security number you will"
A. Give all the information as it is good for my bank to have my updated information.
B. Just give social security number, the bank should know your account number already.
C. Give bank account number and other details except social security number.
D. Offer to visit the nearest branch and update as required or call the bank with the number you know is authentic.
23. You receive an email from an unknown source asking you to download a patch that will make your computer more secure. You will
A. download the patch and not forward to anyone.
B. download, install and burn it on a cd as backup for future use.
C. download the patch and forward the email to all your friends to help them.
D. ignore, report as spam and delete the email.
24. Someone from a charity calls and asks you for a donation over the phone and you want to donate money. What will you do?
A. Give credit card or bank account information over the phone to donate money.
B. Request the caller to mail information to you by post so you can research about them before donating.
C. Ask them a postal address and mail them a check.
25. You have a Mac so you don't have to worry about viruses.
A. False
B. True
26. Windows XP Professional with SP2 is COMPLETELY secure.
A. True
B. False
27. The next time you order checks, you will do this for security reasons:
A. Your social security number printed near your name.
B. Have only your initials (instead of first name) and last name put on them.
28. How can you prevent intruders from accessing your wireless network?
A. Encrypt network traffic with WPA or WEP
B. Restrict access to trusted MAC addresses
C. Both
29. You receive an email that claims that if you forward the email to 15 of your friends you will get lucky otherwise you will have bad luck for the next few months. What will you do?
A. You will forward the email.
B. Ignore and just delete the email.
30. What governs the type of traffic that is and is not allowed through a firewall?
A. rule base
B. gateway
C. access control list
D. partition
31. What is the term for an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database?
A. X-mail harvest
B. Directory harvest attack
C. Spambot attack
D. Email validator
32. What protocol ensures privacy between communicating applications and their users on the Internet?
A. F-Secure
B. Privacy Control Protocol
C. Secure Shell Authentication
D. Transport Layer Security
33. This standard being developed by IBM, Microsoft, Novell and others will allow different manufacturers' biometric software to interact.
A. IDEA
B. Twofish
C. BioAPI
34. This two-level scheme for authenticating network users functions as part of the Web's Hypertext Transfer Protocol.
A. SSL
B. CRAM
C. LUHN formula
35. This standard being developed by IBM, Microsoft, Novell and others will allow different manufacturers' biometric software to interact.
A. IDEA
B. Twofish
C. BioAPI
36. What is the term for an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database?
A. X-mail harvest
B. Directory harvest attack
C. Spambot attack
D. Email validator
37. What governs the type of traffic that is and is not allowed through a firewall?
A. rule base
B. gateway
C. access control list
D. partition
38. This two-level scheme for authenticating network users functions as part of the Web's Hypertext Transfer Protocol.
A. SSL
B. CRAM
C. LUHN formula
39. What protocol ensures privacy between communicating applications and their users on the Internet?
A. F-Secure
B. Privacy Control Protocol
C. Secure Shell Authentication
D. Transport Layer Security
40. This is a common type of denial-of-service attack that involves sending more traffic to a network address than the temporary data storage area is intended to hold, thereby shutting down the service and possibly corrupting or overwriting valid data
A. war dialing
B. buffer overflow
C. smurf attack
D. bucket brigade
Cyber Security Answer Key\
21. B
22. D
23. D
24. B
25. A
26. B
27. B
28. C
29. B
30. A
31. B
32. D
33. C
34. B
35. C
36. B
37. A
38. B
39. D
40. B
A. Spyware.
B. Virus.
C. Firewall.
D. Norton.
22. Which is a good choice in this situation?
"If someone from your bank calls you and asks you to update your personal information including bank account number and social security number you will"
A. Give all the information as it is good for my bank to have my updated information.
B. Just give social security number, the bank should know your account number already.
C. Give bank account number and other details except social security number.
D. Offer to visit the nearest branch and update as required or call the bank with the number you know is authentic.
23. You receive an email from an unknown source asking you to download a patch that will make your computer more secure. You will
A. download the patch and not forward to anyone.
B. download, install and burn it on a cd as backup for future use.
C. download the patch and forward the email to all your friends to help them.
D. ignore, report as spam and delete the email.
24. Someone from a charity calls and asks you for a donation over the phone and you want to donate money. What will you do?
A. Give credit card or bank account information over the phone to donate money.
B. Request the caller to mail information to you by post so you can research about them before donating.
C. Ask them a postal address and mail them a check.
25. You have a Mac so you don't have to worry about viruses.
A. False
B. True
26. Windows XP Professional with SP2 is COMPLETELY secure.
A. True
B. False
27. The next time you order checks, you will do this for security reasons:
A. Your social security number printed near your name.
B. Have only your initials (instead of first name) and last name put on them.
28. How can you prevent intruders from accessing your wireless network?
A. Encrypt network traffic with WPA or WEP
B. Restrict access to trusted MAC addresses
C. Both
29. You receive an email that claims that if you forward the email to 15 of your friends you will get lucky otherwise you will have bad luck for the next few months. What will you do?
A. You will forward the email.
B. Ignore and just delete the email.
30. What governs the type of traffic that is and is not allowed through a firewall?
A. rule base
B. gateway
C. access control list
D. partition
31. What is the term for an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database?
A. X-mail harvest
B. Directory harvest attack
C. Spambot attack
D. Email validator
32. What protocol ensures privacy between communicating applications and their users on the Internet?
A. F-Secure
B. Privacy Control Protocol
C. Secure Shell Authentication
D. Transport Layer Security
33. This standard being developed by IBM, Microsoft, Novell and others will allow different manufacturers' biometric software to interact.
A. IDEA
B. Twofish
C. BioAPI
34. This two-level scheme for authenticating network users functions as part of the Web's Hypertext Transfer Protocol.
A. SSL
B. CRAM
C. LUHN formula
35. This standard being developed by IBM, Microsoft, Novell and others will allow different manufacturers' biometric software to interact.
A. IDEA
B. Twofish
C. BioAPI
36. What is the term for an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database?
A. X-mail harvest
B. Directory harvest attack
C. Spambot attack
D. Email validator
37. What governs the type of traffic that is and is not allowed through a firewall?
A. rule base
B. gateway
C. access control list
D. partition
38. This two-level scheme for authenticating network users functions as part of the Web's Hypertext Transfer Protocol.
A. SSL
B. CRAM
C. LUHN formula
39. What protocol ensures privacy between communicating applications and their users on the Internet?
A. F-Secure
B. Privacy Control Protocol
C. Secure Shell Authentication
D. Transport Layer Security
40. This is a common type of denial-of-service attack that involves sending more traffic to a network address than the temporary data storage area is intended to hold, thereby shutting down the service and possibly corrupting or overwriting valid data
A. war dialing
B. buffer overflow
C. smurf attack
D. bucket brigade
Cyber Security Answer Key\
21. B
22. D
23. D
24. B
25. A
26. B
27. B
28. C
29. B
30. A
31. B
32. D
33. C
34. B
35. C
36. B
37. A
38. B
39. D
40. B