Professional Documents
Culture Documents
EXERCISE EXAM
Test
Test Number: 1-50
QUESTION 1
Smith receives a emai! "r#m his ba$
i"#rmi% him that it sus&ects a
uauth#ri'e( trasacti# # his acc#ut) T#
&r#tect his acc#ut* the emai! a(vises Smith
t# c!ic$ # a !i$ t# veri"+ his i(etit+ a(
&r#vi(e a+ missi% i"#rmati# i the "#rm)
Smith is a victim #":
A) C#m&uter-ase(
C#m&uter-ase( S#cia! E%ieeri%)
) 6uma-ase( S#cia! E%ieeri%
C) S#cia! E%ieeri% Usi% SMS
/) S&am Emai!
QUESTION 7
C+ber crimia!s ca use +#ur c#m&uter t# stea! &ers#a!
a( #ther im&#rtat i"#rmati# "r#m +#u #r (# s#me
mischiev#us activities) 8#h 3hi!e sur9% the Iteret %ets
a &#&-u& a( a( it ta$es
ta$es 8#h t# a 3ebsite that #ers a
"ree %ame "#r his c#m&uter) ,hat is the best c#urse acti#
"#r 8#h4
A) /#3!#a( the %ame #3* a( (eci(e !ater 3hether t#
ista!! # his .C #r %ive the %ame t# his "rie(
) /#3!#a( the %ame* ista!! it* as 8#h ca uista!! the
%ame a+time i" there is a+ &r#b!em
C) Research ab#ut the %ame # the Iteret a( chec$
3hether it is sa"e t# (#3!#a( it #r #t)
/) Chec$ 3hether the 3ebsite is as$i% "#r a+ m#e+) I" it
is "ree* sim&!+ (#3!#a( the %ame
QUESTION ;
Social networking websites such as Facebook and Twitter
Twitter allow
users to create their own personal webpages and connect with
their relatives and friends. Creating webpages on social networking
sites is fun and exciting. What if, while creating a website, the user
is not careful enough which can pave way for hackers and other
malicious users !lisha also created her own webpage on
Facebook. She got a message on her wall saying "#ey !lisha, its
ur uncle Tom$
Tom$ Thanks for the invitation % &unt 'ichel is f( and we
both )ove ur webpage. Wed love to *oin ur friend list$" What does
!lisha have to do now
A) Acce&t the re<uest
) /e+ the re<uest)
C) Acce&t but %ive access t# !ess i"#rmati#
/) /e!ete the 3eb&a%e
QUESTION 5
+t can be convenient to access email and surf the +nternet using a
wireless computer. #owever, wireless networks can be vulnerable to
hackers unless the user takes necessary precautions. onald wants to
make an insurance policy and buy some stock online using his wireless
computer. While investing, the agency re-uires onald to prove his
identity and provide a security token. sing a security token when
investing online allows /ohn to
A) Sh#&b#t
) Trust veri9cati# site)
C) usiess rati% site
/) Sh#&&i% &#rta!s
QUESTION
+ want to re-uest secure web pages using https899.
What port will + need to open on my firewall to
allow these SS)%encrypted packets to flow
&. ::
0. ;<
C. =>
3. ??<.
QUESTION 10
Susan spends most of the time on computer working
and doing other things. Susan left her 7C connected to
+nternet idle for some time. &n attacker, although was
not able to steal any information, remotely utili@ed her
7CAs processor cycles for some of his computationally
intensive task. Classify the above breach of security
A) N#-secure m#(e)
) =eavi% securit+ u& t# each a&&!icati#
C) E"#rce !i$ ecr+&ti# "#r a!! tra@c
/) Securit+ setti%s (e"au!t t# a m#bi!e &#!ic+ server
QUESTION 1?
&ustin and Stuart are two brothers. &ustin works for a reputed +T
firm and sometimes his *ob re-uires him to work from home
with his 7C connected to the +nternet. When &ustin is away to
work, his brother Stuart uses his 7C. &ustin suspected that his
brother browses +nternet fre-uently and watches porn on his
7C. &ustin wants to -uietly and automatically block all the porn
websites so that his brother does not visit them. What must
&ustin do in order to block the porn websites automatically
&. +nstall scanning tool to scan the system
0. +nstall a firewall that blocks all porn
C. +nstall an antivirus software and activate parental control.
3. +nstall a keylogger
QUESTION 1
Nic$ receive( a emai! &r#m#ti# stati% that
he has 3# a e3 car) The emai! as$s him t#
(e&#sit G;0 t# the se(erFs acc#ut a(
&r#vi(e s#me cre(etia!s) ,hat 3i!! be the
best c#urse #" acti# "#r Nic$ i this situati#4
A) Save a( #&e a+ (#cumets that +#u acce&t "r#m +#ur IM
c#tacts
) /# #t c!ic$ # the !i$s set b+ u$#3 members i the
chat r##m)
C) L#u ee( t# use +#ur &ers#a! emai! I/ t# re%ister t# !i$s
that are set thr#u%h IM
/) /# #t #&e 9!es 3ith the eDtesi# etc)
QUESTION
,hich am#% the "#!!#3i% eD&!#its
&e#&!eFs te(ec+ t# se!ect 3ea$
&ass3#r(s a( uses a !ist #" &re-(e9e(
3#r(s t# (isc#ver the c#rrect &ass3#r(s4
A) >uessi%
) rute #rci%
C) /icti#ar+ Attac$)
/) Sh#u!(er Sur9%
QUESTION 7
,hich #" the "#!!#3i% &ass3#r( 3i!! be the
str#%est4
A) <3ert+
) a(miistrat#r
C) Q5?ra>)
/) m+&ass3#r(
QUESTION ;
,hat is the &r#cess #" ec#(i% i"#rmati#
i a 3a+ s# that #!+ s#me#e 3ith a $e+
ca (ec#(e it4
A) C#m&ressi#
) Ste%a#%ra&h+
C) S+stemic variati#
/) Ecr+&ti#)
QUESTION 5
8#h use( a t##! t# create a ecr+&te( va!ue
simi!ar t#
Kb?7Beee"70?(0e?"ae(e;?aK
re&reseti% a im&#rtat 9!e) 6is et3#r$
a(miistrat#r t#!( him that this va!ue 3i!! be
(ieret ever+ time there is a cha%e i the 9!e)
,hat is 8#h %eerati% i #r(er t# chec$ the
ite%rit+ #" the 9!e4
A) Ecr+&ti# a!%#rithm
) 6ash va!ue)
C) Ecr+&ti# va!ue
/) /ecr+&ti# va!ue
QUESTION ?
The screen below appears while you are browsing the +nternet. What is the
most appropriate action you will take to keep your system secure
&. 4ou have an out of date browser, as indicated by the message. 4ou
will click 7rotect 7C Eow button.
0. 4ou have an out of date browser, as indicated by the message. 4ou
will click pdates button in the left pane.
C. This is probably a malware attack. 4ou will close the screen by
clicking Close D option at the right%top corner of the screen.
QUESTION
#b 3ats t# se( a sh#rt c#9(etia!
messa%e t# Smith* usi% &ub!ic $e+
cr+&t#%ra&h+) 6#3 sh#u!( #b achieve
that4
A) #b sh#u!( ecr+&t it 3ith his &rivate $e+
) #b sh#u!( ecr+&t it 3ith his &ub!ic $e+
C) #b sh#u!( ecr+&t it 3ith SmithFs &rivate
$e+
/) #b sh#u!( ecr+&t it 3ith Smiths &ub!ic
$e+)
QUESTION B
,hich #" the "#!!#3i% s#"t3are &r#%rams
3#u!( eab!e a attac$er t# have a
c#m&!ete c#tr#! #ver a victimFs c#m&uter4
A) irus
) ,#rm
C) Tr#Ha)
/) Pe+!#%%er
QUESTION
Na(a!* the i(ustria!ist "r#m N#r3a+* 3as trave!!i%
"r#m his h#met#3 t# urich "#r busiess
&ur&#se) O the 3a+ his &h#e 3as st#!e b+ a
bur%!ar) ,hich c#(e Na(a! ma+ use t# (eactivate
his &h#e i #r(er t# save his &ers#a! as 3e!! as
c#9(etia! busiess i"#rmati# st#re( i his
&h#e4
A) IMEI c#(e)
) IEMI c#(e
C) 0
/) 0
QUESTION 70
I" +#u ever receive a us#!icite( te!e&h#e
ca!! "r#m s#me#e c!aimi% t# ee( +#ur
&ass3#r(* 3hat 3#u!( +#u (#4
A) 6I.AA)
) ER.A
C) .CI /SS
/) AA.IE
QUESTION 7;
The following diagram shows a network device that is used for
connecting the modem to the network and determining the next network
point to which a packet should be forwarded. This device can access the
address of a network layer and can have incorporated software that
helps it identify the possible paths between the addresses and the
appropriate channels to transmit data.
A) 6ub
NICs
QUESTION 75
The a(vace( ecr+&ti# sta(ar( AES2 is
a iterate( s+mmetric b!#c$ ci&her (e9e( i
I.S* 3hich meas that it 3#r$s b+ re&eati%
the same (e9e( ste&s mu!ti&!e times) ,hat
$e+ !e%th (#es AES #t su&&#rt4
A) 1B-bit
) 51-bit)
C) 5?-bit
/) 1-bit
QUESTION 7?
L#ur I. a((ress ca !i$ +#ur Iteret activities
(irect!+ t# +#uV it ca be use( t# 9( +#ur ame
a( !#cati#) S# &r#tecti% +#ur O!ie I(etit+ is a
must* thus A#+m#us ,eb Sur9% a( the abi!it+
t# hi(e +#ur I. a((ress are ma(at#r+ i #r(er t#
esure a hi%h !eve! #" #!ie &r#tecti#) ,hich #"
the "#!!#3i% is a I. A((ress 6i(i% T##!4
A) TOR)
) 6i(er I.
C) A#+m#us Use
/) M+ I.
QUESTION 7
,hich #" the "#!!#3i% 3i!! he!& &revet
uautheticate( access t# the 3ire!ess
et3#r$4
A) !uesi&i%
) !ueHac$i%)
C) u''i% attac$
/) !uesar9%
QUESTION ;
htt&:333)eD&eria)c#m*
htt&:333)e<ui"aD)c#m* a(
htt&:333)trasui#)c#m are eDam&!es #"
cre(it re&#rti% a%ecies) L#u sh#u!( c#tact
these a%ecies i" sus&ect that +#ur i(etit+ is
st#!e) These a%ecies 3i!! he!& +#u i: