Cyber Security part 4
61.What can a firewall protect against?
A. Viruses
B. Unauthenticated interactive logins from the outside world
C. Fire
D. Connecting to and from the outside world
62. The National Security Alliance in 2004 estimated what percentage of home PCs are infected with spyware?
A. 20%
B. 40%
C. 60%
D. 80%
63. In comparison to the illegal drug trade, Cyber crime generates:
A. Less Money
B. It is mainly done by computer geeks for kicks instead of money
C. More Money
64. This is a document that states in writing how a company plans to protect the company's physical and IT assets.
A. Data Encryption Standard
B. Security policy
C. Public key certificate
D. Access control list
65. This is a program or file that is specifically developed for the purpose of doing harm:
A. Buffer overflow
B. Bastion host
C. Malware
D. Ping sweep
66. This is a program in which malicious or harmful code is contained inside apparently harmless programming or data.
A. War dialer
B. Spam trap
C. Trojan horse
D. Email
67. What are the three most important things you can do to secure desktop PCs?
a. Turn on Automatic Updates
b. Turn on Windows Firewall
c. Install anti-virus software
d. Remove the hard drive
A. a, c, and d
B. a, b, and c
C. b, c, and d
D. a, b, and d
E. only c
68. Which of the following is an example of a strong password?
A. Password
B. J*p2le04>F
C. Your real name, user name, or company name
69. True of false: If you set your anti-virus software to auto-update then you don't need Windows Automatic Updates.
A. True
B. False
70. What is "phishing?"
A. "Spoofed" e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords
B. A type of computer virus
C. An example of a strong password
D. A boring activity that uses a rod and bait.
E. None of the above
71. You receive an e-mail message from someone you know well with Subject: line 'Here it is' and the file attachment is named draft.doc. What do you do?
A. Open the attachment
B. Save the attachment to disk and scan it for viruses
C. Contact the sender to determine if he/she created and sent the draft.doc attachment
72. You are using e-mail to send and receive private information (e.g. medical data, salary information, social security numbers, passwords). What do you do?
A. Put all of the information in one large message before sending it to reduce the chance that it will fall into the wrong hands
B. Encrypt the information before sending it through e-mail
C. Put the information in many small messages so that only a small information will be exposed if it falls into the wrong hands.
73. You are receiving bothersome or threatening e-mail messages. What do you do?
A. Save the messages and report the problem to your supervisor
B. Ignore the messages and delete them
C. Contact the police
D. Hire a hit man to rough them up
74. You learn about a new screen saver that you can download from the Internet to put on your PC at work. What do you do?
A. Don't download the screen saver. This action is not allowed.
B. Download the screen saver and scan it for viruses before installing it.
C. Search the Internet for reports describing this screen saver.
75. You get a new computer. What do you do?
A. Connect it to the network and start using it.
B. Secure it against the most common attacks, connect it to the network and start using it.
C. Don't connect it to the network.
76. According to the FBI and the Computer Security Institute, most information security breaches occur due to what?
A. External Hackers
B. Poor Programming
C. Internal Employees
D. Bad Firewall Settings
77. Which of the following is the most important to install and keep up to date on your personal computer?
A. Anti-virus and anti-spyware software
B. Anti-spam software
C. A Firewall
D. Operating system updates
E. All of the above must be installed and kept up to date
78. What percentage of people have reported that someone has stolen personally-identifiable information?
A. 5%
B. 10%
C. 15%
D. 20%
E. 25%
79. Typo-squatting is?
A. A typo in operating system code that gives malware easy entry
B. A malicious website using a URL similar to a real one
C. The process of patching vulnerabilities
D. What online grammar-police complain about
80. What does HTTP stand for?
A. Hyper Transfer Text Protocol
B. Hyper Transfer Text Program
C. Hyper Text Transfer Protocol
D. Hyper Text Transfer Program
Cyber Security Answer Sheet
61. B
62. D
63. C
64. B
65. C
66. C
67. B
68. B
69. B
70. A
71. C
72. B
73. A
74. A
75. B
76. C
77. E
78. A
79. B
80. C
A. Viruses
B. Unauthenticated interactive logins from the outside world
C. Fire
D. Connecting to and from the outside world
62. The National Security Alliance in 2004 estimated what percentage of home PCs are infected with spyware?
A. 20%
B. 40%
C. 60%
D. 80%
63. In comparison to the illegal drug trade, Cyber crime generates:
A. Less Money
B. It is mainly done by computer geeks for kicks instead of money
C. More Money
64. This is a document that states in writing how a company plans to protect the company's physical and IT assets.
A. Data Encryption Standard
B. Security policy
C. Public key certificate
D. Access control list
65. This is a program or file that is specifically developed for the purpose of doing harm:
A. Buffer overflow
B. Bastion host
C. Malware
D. Ping sweep
66. This is a program in which malicious or harmful code is contained inside apparently harmless programming or data.
A. War dialer
B. Spam trap
C. Trojan horse
D. Email
67. What are the three most important things you can do to secure desktop PCs?
a. Turn on Automatic Updates
b. Turn on Windows Firewall
c. Install anti-virus software
d. Remove the hard drive
A. a, c, and d
B. a, b, and c
C. b, c, and d
D. a, b, and d
E. only c
68. Which of the following is an example of a strong password?
A. Password
B. J*p2le04>F
C. Your real name, user name, or company name
69. True of false: If you set your anti-virus software to auto-update then you don't need Windows Automatic Updates.
A. True
B. False
70. What is "phishing?"
A. "Spoofed" e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords
B. A type of computer virus
C. An example of a strong password
D. A boring activity that uses a rod and bait.
E. None of the above
71. You receive an e-mail message from someone you know well with Subject: line 'Here it is' and the file attachment is named draft.doc. What do you do?
A. Open the attachment
B. Save the attachment to disk and scan it for viruses
C. Contact the sender to determine if he/she created and sent the draft.doc attachment
72. You are using e-mail to send and receive private information (e.g. medical data, salary information, social security numbers, passwords). What do you do?
A. Put all of the information in one large message before sending it to reduce the chance that it will fall into the wrong hands
B. Encrypt the information before sending it through e-mail
C. Put the information in many small messages so that only a small information will be exposed if it falls into the wrong hands.
73. You are receiving bothersome or threatening e-mail messages. What do you do?
A. Save the messages and report the problem to your supervisor
B. Ignore the messages and delete them
C. Contact the police
D. Hire a hit man to rough them up
74. You learn about a new screen saver that you can download from the Internet to put on your PC at work. What do you do?
A. Don't download the screen saver. This action is not allowed.
B. Download the screen saver and scan it for viruses before installing it.
C. Search the Internet for reports describing this screen saver.
75. You get a new computer. What do you do?
A. Connect it to the network and start using it.
B. Secure it against the most common attacks, connect it to the network and start using it.
C. Don't connect it to the network.
76. According to the FBI and the Computer Security Institute, most information security breaches occur due to what?
A. External Hackers
B. Poor Programming
C. Internal Employees
D. Bad Firewall Settings
77. Which of the following is the most important to install and keep up to date on your personal computer?
A. Anti-virus and anti-spyware software
B. Anti-spam software
C. A Firewall
D. Operating system updates
E. All of the above must be installed and kept up to date
78. What percentage of people have reported that someone has stolen personally-identifiable information?
A. 5%
B. 10%
C. 15%
D. 20%
E. 25%
79. Typo-squatting is?
A. A typo in operating system code that gives malware easy entry
B. A malicious website using a URL similar to a real one
C. The process of patching vulnerabilities
D. What online grammar-police complain about
80. What does HTTP stand for?
A. Hyper Transfer Text Protocol
B. Hyper Transfer Text Program
C. Hyper Text Transfer Protocol
D. Hyper Text Transfer Program
Cyber Security Answer Sheet
61. B
62. D
63. C
64. B
65. C
66. C
67. B
68. B
69. B
70. A
71. C
72. B
73. A
74. A
75. B
76. C
77. E
78. A
79. B
80. C