Cybersecurity Prologue MCQs Solution | TCS Fresco Play | Fresco Play | TCS | MNCAnswers
Make an effort to understand these solutions and apply them to your Hands-On difficulties. (It is not advisable that copy and paste these solutions).
All Question of the MCQs Present Below for Ease Use Ctrl + F with the question name to find the Question. All the Best!
1. What is PUP?
Potentially unwanted program
2. monitors user activity on internet and transmit that information in the background to someone else
Spyware
3. Unsolicited commercial email is known as _
Spam
4. Internet can impose a number of Risks and hence Cybersecurity is required -
True
5. A ________ is like a Virus, having the ability to spread without any medium -
Worm
6. Which of these are Personally Identifiable Information?
all
7. Which of these is an anti-virus program
all
8.The sole purpose of ________ attack, is to fool the victim and to get all the confidential information
Phishing
9. If there is a vulnerability but no threat, then there won't be a risk
TRUE
10. In Symmetric-key cryptography, the key used by the sender and the receiver is
Shared
11. Risk represents
Threats times vulnerabilities
12. Cryptography, a word with Greek origins, means
Secret Writing
13. The Cryptography can provide
all
14. Detection and Analysis is a continuous process of a cyber-attack for detecting Malware intrusion and their remote connections -
TRUE
15. Which is a part of a response phase activities ?
Take appropriate pre-approved or required actions
16. UML component diagram is used to identify how a module validate &processes the data before storing it
false
17. Incident Category can be defined according to business functional priorities
true
18. Incidents should be handled on a first come- first serve basis and must be prioritized based on the Business impact
FALSE
19. Which is not part of a Incident Response Preparation phase ?
Create appropriate control framework
20. Which is not a set of activity performed to prevent future incidents in Incident management ? Mitigate
21. Deep packet inspection can be used to give more context to indicator only
FALSE
22. A ________ is a credit card sized card with an embedded chip, containing information about the user
Smart Card
23. Which of these are Threats related to Email Security?
all
24. Phishing emails include fake notifications from banks and e-payment systems
TRUE
25. Which of these are examples biometrics?
all
26. Which of these is TRUE with respect to passwords?
Passwords need to be atleast 8 chars of length
27. How do we define RADIUS?
Remote Authentication Dial-In User Service.
28. As an email client, we should not use caution when opening emails and can download any attachments
FALSE
29. At Operational level threat intelligence real time feed protocols are being used
TRUE
30. Cyber security architecture is all about understanding one's Business Scope and requirements only
FALSE
31. Which of the following is not an antivirus software?
Code Red
32. Network layer firewall works as a
Packet filter
33. The Cryptography can provide
all
34. are attempts by individuals to obtain confidential information from you to falsifying their identity Spyware scams - wrong
35. Attack which happens due to neglected factors like compromising with security is a type of
Non-Malicious threat
36. Which helps to determine the effective security controls and measurement techniques
Threat Modelling
37. A Hacker or disgruntled employee who is interested in specific Asset or information is a type of
Malicious threat
38. A TCS business operations team required to meet 98% SLA in FY 2017'18 to avoid non-compliance penalty which must be a part of
Architecture Controls
39. Defining the security control parameter SLA at 98.5% for taking appropriate actions to avoid penalty risk if it goes below 98% must be a part of
Architecture Risks
40. At Strategic level threat intelligence information can be exchanged within it's operating community TRUE
41. The altering of data so that it is not usable unless the changes are undone is
Encryption
42. It is a program or hardware device that filters the information coming through an internet connection to a network or computer system
firewall
43. An attempt to make a computer resource unavailable to its intended users is called
Denial-of-service attack
44.At Tactical level threat intelligence research analysis and reports can be published after malware analysis
false
45. UEBA stands for
User Entity and Behavior Analytics
46. ________ is the guarantee of data privacy and protection against unauthorized disclosure.
Confidentiality
47. Which is a open source data loss prevention solution.
MyDLQ
48. A ________ is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection.
VPN
49. Which helps to predict the cybersecurity potential risks effectively ?
Threat Mitigation
50. The relationship between a character in the plaintext to a character is
Many-to-one relationship
51. In asymmetric key cryptography, the private key is kept by
Sender and Receiver
52. They Keys used in Cryptography are
Single Round
53. Which of the following would most likely not be a symptom of a virus?
Existing program files and icons disappear
54. In symmetric-key cryptography, the same key is used by
Both Party
55. which can't be used as a best practice for managing cyber threats ?
Behavioral Modelling
56. WPA2 is used for security in ________
Wifi
57. In cryptography, what is cipher?
ALL
58. In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is.
Long
59. Which is not a characteristics of Advanced Persistent threats ?
Full automated
60. Traffic in a VPN is not
Logically
Post a Comment