Download our latest MNC Answers Application at Play Store. Download Now

Cybersecurity Prologue MCQs Solution | TCS Fresco Play | Fresco Play | TCS | MNCAnswers

Cybersecurity Prologue MCQs Solution | TCS Fresco Play | Fresco Play | TCS


Disclaimer: The primary purpose of providing this solution is to assist and support anyone who are unable to complete these courses due to a technical issue or a lack of expertise. This website's information or data are solely for the purpose of knowledge and education.

Make an effort to understand these solutions and apply them to your Hands-On difficulties. (It is not advisable that copy and paste these solutions).

All Question of the MCQs Present Below for Ease Use Ctrl + F with the question name to find the Question. All the Best!

If you found answer for any of the questions is wrong. Please do mention in the comment section, could be useful for others. Thanks!

______________________________________

1. What is PUP?  

Potentially unwanted program

 2. monitors user activity on internet and transmit that information in the background to someone else

Spyware

3. Unsolicited commercial email is known as _

Spam

4. Internet can impose a number of Risks and hence Cybersecurity is required -

True 

5. A ________ is like a Virus, having the ability to spread without any medium -

Worm

6. Which of these are Personally Identifiable Information?

all

7. Which of these is an anti-virus program

all

 8.The sole purpose of ________ attack, is to fool the victim and to get all the confidential information

Phishing

9. If there is a vulnerability but no threat, then there won't be a risk

TRUE

10. In Symmetric-key cryptography, the key used by the sender and the receiver is

Shared

11. Risk represents

Threats times vulnerabilities

12. Cryptography, a word with Greek origins, means  

Secret Writing

13. The Cryptography can provide

all

14. Detection and Analysis is a continuous process of a cyber-attack for detecting Malware intrusion and their remote connections -

TRUE

15. Which is a part of a response phase activities ?

Take appropriate pre-approved or required actions

16. UML component diagram is used to identify how a module validate &processes the data before storing it  

false

17. Incident Category can be defined according to business functional priorities  

true

18. Incidents should be handled on a first come- first serve basis and must be prioritized based on the Business impact

FALSE

19. Which is not part of a Incident Response Preparation phase ?

Create appropriate control framework

20. Which is not a set of activity performed to prevent future incidents in Incident management ? Mitigate

21. Deep packet inspection can be used to give more context to indicator only

FALSE

22. A ________ is a credit card sized card with an embedded chip, containing information about the user

Smart Card

23. Which of these are Threats related to Email Security?

all

24. Phishing emails include fake notifications from banks and e-payment systems

TRUE

25. Which of these are examples biometrics?

all

26. Which of these is TRUE with respect to passwords?

Passwords need to be atleast 8 chars of length

27. How do we define RADIUS?

Remote Authentication Dial-In User Service.

28. As an email client, we should not use caution when opening emails and can download any attachments

FALSE

29. At Operational level threat intelligence real time feed protocols are being used

TRUE

30. Cyber security architecture is all about understanding one's Business Scope and requirements only

FALSE

31. Which of the following is not an antivirus software?

Code Red

32. Network layer firewall works as a

Packet filter

33. The Cryptography can provide

all

34. are attempts by individuals to obtain confidential information from you to falsifying their identity Spyware scams - wrong

35. Attack which happens due to neglected factors like compromising with security is a type of 

Non-Malicious threat

36. Which helps to determine the effective security controls and measurement techniques

Threat Modelling

37. A Hacker or disgruntled employee who is interested in specific Asset or information is a type of

Malicious threat

38. A TCS business operations team required to meet 98% SLA in FY 2017'18 to avoid non-compliance penalty which must be a part of

Architecture Controls

39. Defining the security control parameter SLA at 98.5% for taking appropriate actions to avoid penalty risk if it goes below 98% must be a part of

Architecture Risks

40. At Strategic level threat intelligence information can be exchanged within it's operating community TRUE 

41. The altering of data so that it is not usable unless the changes are undone is

Encryption

42. It is a program or hardware device that filters the information coming through an internet connection to a network or computer system

firewall

43. An attempt to make a computer resource unavailable to its intended users is called

Denial-of-service attack

44.At Tactical level threat intelligence research analysis and reports can be published after malware analysis

false

45. UEBA stands for

User Entity and Behavior Analytics

46. ________ is the guarantee of data privacy and protection against unauthorized disclosure.

Confidentiality

47. Which is a open source data loss prevention solution.

MyDLQ

48. A ________ is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection.

VPN

49. Which helps to predict the cybersecurity potential risks effectively ?

Threat Mitigation

50. The relationship between a character in the plaintext to a character is

Many-to-one relationship

51. In asymmetric key cryptography, the private key is kept by

Sender and Receiver 

52. They Keys used in Cryptography are

Single Round

53. Which of the following would most likely not be a symptom of a virus?

Existing program files and icons disappear

54. In symmetric-key cryptography, the same key is used by

Both Party 

55. which can't be used as a best practice for managing cyber threats ?

Behavioral Modelling

56. WPA2 is used for security in ________

Wifi

57. In cryptography, what is cipher?

ALL

58. In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is.

Long

59. Which is not a characteristics of Advanced Persistent threats ?

Full automated 

60. Traffic in a VPN is not

Logically 



**************************************************

If you have any queries, please feel free to ask on the comment section.
If you want MCQs and Hands-On solutions for any courses, Please feel free to ask on the comment section too.

Please share and support our page!