CyBer Security part 3
41. Microsoft's Passport is an example of this technology,
which allows users to register their personal information once to access
multiple applications.
A. Microsoft Point-to-Point Encryption.
B. Single Signon.
C. Relative Identifier.
D. Biometric Verification
42. Anti Virus programs protect your computer from spyware.
A. True
B. False
43. This is a computer system on the Internet that is expressly set up to attract and "trap" intruders.
A. Exploit
B. demilitarized zone
C. Trojan horse
D. honeypot
44. Your friend sends you a website link requesting you to update your address information. What will you do?
A. Click on the link and update the information.
B. Read the privacy policy on the website and decide if you want to provide the information or not.
C. Update and forward the link to all your friends.
D. Report your friends email address as spam.
45. Which of the following methods does spyware use to install on an end user's machine?
A. Bundling with free peer-to-peer programs
B. Social engineering
C. Search toolbars
D. All of the above
46. WEP is a security protocol, specified in 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN. What does WEP stand for?
A. Wired Equivalent Privacy
B. Wireless Equivalent Protocol
C. Wireless Equivalent Privacy
47. Firewall is a software or hardware that can protect a computer from virus.
A. False
B. True
48. While you were browsing the web, you get a pop up window that says "Congratulations! You just won a TV, click here to claim". You ...
A. feel very happy, click on it and give all the information it asks.
B. just close the window and ignore it.
49. Windows XP is secure by default
A. False
B. True
50. What do you call a program used to detect unsolicited and unwanted e-mail and prevents those messages from getting to a user's inbox?
A. anti-spammer.
B. email guard.
C. virus filter.
D. spam filter.
51. You receive an email from an unknown source asking you to download a patch that will make your computer more secure. You will
A. download the patch and forward the email to all your friends
B. download the patch and not forward to anyone.
C. ignore, report as spam and delete the email.
D. download, install and burn it on a cd as backup for future use.
52. HTTPS is a Web protocol developed by Netscape and built into its browser that encrypts and decrypts user page requests as well as the pages that are returned by the Web server. What does HTTPS stand for?
A. Hypertext Transfer Protocol Security
B. Hypertext Transfer Protocol over Secure Socket Layer
C. Hypertext Transfer Protocol over Sublayer
53. What is SSL used for?
A. Encrypt data as it travels over a network
B. Encrypt passwords for storage in a database
C. Encrypt files located on a Web server
D. Encrypt digital certificates used to authenticate a Web site
54. In order to protect yourself from identity theft you should
A. Order and review your credit report from the credit reporting bureaus at least once a year.
B. Never give personal information over the phone such as social security number or financial information unless you initiated the phone call.
C. Review your credit card statements and bank statements for discrepancies.
D. All of the above.
55. How does spyware differ from other forms of malware, such as worms and viruses?
A. The delivery mechanism is unaware that it contains spyware.
B. Spyware installs without the user's knowledge.
C. Not all spyware is malicious.
D. Spyware replicates itself.
56. Phishing and Pharming are forms of social engineering.
A. True
B. False
57. Once you have logged on to your bank's website you can determine that SSL is being used on the site by looking for
A. A small padlock icon, usually in the lower right corner of your Web browser window. A closed, or locked padlock indicates a secure connection.
B. https:// -- in the address line of your browser.
C. Both
58. On average, how long does it take for an unprotected networked computer to be compromised once it is connected to the internet?
A. 1 Week
B. 20 minutes
C. 10 hours
D. 7 Days
59. What type of attack relies on the trusting nature of employees and the art of deception?
A. Social Engineering
B. Fraud
C. Phishing
D. Dumpster Diving
60. You may give someone your password if:
A. It is never OK to give out your password
B. Your Boss asks you for your password
C. The helpdesk asks you for your password
D. Your Boss says it is OK to give someone your password
Cyber Security Answer Sheet
41. B
42. B
43. D
44. B
45. D
46. A
47. A
48. B
49. A
50. D
51. C
52. B
53. A
54. D
55. C
56. A
57. C
58. B
59. A
60. A
A. Microsoft Point-to-Point Encryption.
B. Single Signon.
C. Relative Identifier.
D. Biometric Verification
42. Anti Virus programs protect your computer from spyware.
A. True
B. False
43. This is a computer system on the Internet that is expressly set up to attract and "trap" intruders.
A. Exploit
B. demilitarized zone
C. Trojan horse
D. honeypot
44. Your friend sends you a website link requesting you to update your address information. What will you do?
A. Click on the link and update the information.
B. Read the privacy policy on the website and decide if you want to provide the information or not.
C. Update and forward the link to all your friends.
D. Report your friends email address as spam.
45. Which of the following methods does spyware use to install on an end user's machine?
A. Bundling with free peer-to-peer programs
B. Social engineering
C. Search toolbars
D. All of the above
46. WEP is a security protocol, specified in 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN. What does WEP stand for?
A. Wired Equivalent Privacy
B. Wireless Equivalent Protocol
C. Wireless Equivalent Privacy
47. Firewall is a software or hardware that can protect a computer from virus.
A. False
B. True
48. While you were browsing the web, you get a pop up window that says "Congratulations! You just won a TV, click here to claim". You ...
A. feel very happy, click on it and give all the information it asks.
B. just close the window and ignore it.
49. Windows XP is secure by default
A. False
B. True
50. What do you call a program used to detect unsolicited and unwanted e-mail and prevents those messages from getting to a user's inbox?
A. anti-spammer.
B. email guard.
C. virus filter.
D. spam filter.
51. You receive an email from an unknown source asking you to download a patch that will make your computer more secure. You will
A. download the patch and forward the email to all your friends
B. download the patch and not forward to anyone.
C. ignore, report as spam and delete the email.
D. download, install and burn it on a cd as backup for future use.
52. HTTPS is a Web protocol developed by Netscape and built into its browser that encrypts and decrypts user page requests as well as the pages that are returned by the Web server. What does HTTPS stand for?
A. Hypertext Transfer Protocol Security
B. Hypertext Transfer Protocol over Secure Socket Layer
C. Hypertext Transfer Protocol over Sublayer
53. What is SSL used for?
A. Encrypt data as it travels over a network
B. Encrypt passwords for storage in a database
C. Encrypt files located on a Web server
D. Encrypt digital certificates used to authenticate a Web site
54. In order to protect yourself from identity theft you should
A. Order and review your credit report from the credit reporting bureaus at least once a year.
B. Never give personal information over the phone such as social security number or financial information unless you initiated the phone call.
C. Review your credit card statements and bank statements for discrepancies.
D. All of the above.
55. How does spyware differ from other forms of malware, such as worms and viruses?
A. The delivery mechanism is unaware that it contains spyware.
B. Spyware installs without the user's knowledge.
C. Not all spyware is malicious.
D. Spyware replicates itself.
56. Phishing and Pharming are forms of social engineering.
A. True
B. False
57. Once you have logged on to your bank's website you can determine that SSL is being used on the site by looking for
A. A small padlock icon, usually in the lower right corner of your Web browser window. A closed, or locked padlock indicates a secure connection.
B. https:// -- in the address line of your browser.
C. Both
58. On average, how long does it take for an unprotected networked computer to be compromised once it is connected to the internet?
A. 1 Week
B. 20 minutes
C. 10 hours
D. 7 Days
59. What type of attack relies on the trusting nature of employees and the art of deception?
A. Social Engineering
B. Fraud
C. Phishing
D. Dumpster Diving
60. You may give someone your password if:
A. It is never OK to give out your password
B. Your Boss asks you for your password
C. The helpdesk asks you for your password
D. Your Boss says it is OK to give someone your password
Cyber Security Answer Sheet
41. B
42. B
43. D
44. B
45. D
46. A
47. A
48. B
49. A
50. D
51. C
52. B
53. A
54. D
55. C
56. A
57. C
58. B
59. A
60. A