1. Which of these are Personally Identifiable Information?
View Answer
All
2. Which of these is an anti-virus program
View Answer
All
3. What is PUP?
View Answer
Potentially Unwanted Pgm
4. Internet can impose a number of Risks and hence Cybersecurity is required.
View Answer
True
5. ________ monitors user activity on internet and transmit that information in the background to someone else.
View Answer
Spy ware
6. Which of these are cyber threats?
View Answer
All
7. Unsolicited commercial email is known as
View Answer
Spam
8. In symmetric-key cryptography, the same key is used by
View Answer
Both
9. The sole purpose of ________ attack, is to fool the victim and to get all the confidential information
View Answer
Phishing
10. The Cryptography can provide
View Answer
All
11. In Symmetric-key cryptography, the key used by the sender and the receiver is
View Answer
Shared
12. Risk represents ________
View Answer
threats,Vul
13. If there is a vulnerability but no threat, then there won't be a risk.
View Answer
True
14. is the guarantee of data privacy and protection against unauthorized disclosure.
View Answer
Confi
15. Cryptography, a word with Greek origins, means
View Answer
Secret writing
16. Detection and Analysis is a continuous process of a cyber-attack for detecting Malware intrusion and their remote connections.
View Answer
True
17. Which is a part of a response phase activities ?
View Answer
Pre-ap
18. Which is not part of a response follow-up activities ?
View Answer
Take appropriate
19. Which is a open source data loss prevention solution.
View Answer
MYDLP
20. Incidents should be handled on a first come- first serve basis and must be prioritized based on the Business impact.
View Answer
False
21. Which is not part of a Incident Response Preparation phase ?
View Answer
Defining Obj
22. Deep packet inspection can be used to give more context to indicator only.
View Answer
False
23. How do we define RADIUS?
View Answer
Remote Authentication Dial-In User Service
24. Which of these are Threats related to Email Security?
View Answer
All
25. Which of these is true with respect to passwords?
View Answer
atleast 8
26. Which of these are examples biometrics?
View Answer
all
27. Phishing emails include fake notifications from banks and e-payment systems.
View Answer
True
28. A ________ is a credit card sized card with an embedded chip, containing information about the user
View Answer
SC
29. As an email client, we should not use caution when opening emails and can download any attachments.
View Answer
False
30. It is a program or hardware device that filters the information coming through an internet connection to a network or computer system.
View Answer
FW
31. Cybersecurity threat is a scenario which will try to exploit possible vulnerabilities to enhance security
View Answer
False
32. Which is not part of a threat Modelling process ?
View Answer
Comp
33. Which is not part of a threat Modelling process ?
View Answer
ARisk
34. The altering of data so that it is not usable unless the changes are undone is
View Answer
Encryption
35. Network layer firewall works as a
View Answer
PF
36. At Operational level threat intelligence real time feed protocols are being used.
View Answer
True
37. Which one will not be considered in Cybersecurity threat Intrusion Phases ?
View Answer
Alliance
38. Which is not a set of activity performed to prevent future incidents in Incident management?
View Answer
Mitigate
39. UEBA stands for
View Answer
User and Entity Behavior Analytics
40. Which is not a characteristics of Advanced Persistent threats ?
View Answer
FA
41. In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is
View Answer
short
42. Which helps to prevent the cyber-attacks using various security related tools, policies, best practices and guidelines ?
View Answer
TM
43. At Strategic level threat intelligence information can be exchanged within it's operating community
View Answer
False
44. Which helps to predict the cybersecurity potential risks effectively
View Answer
PH
45. Detection and Analysis is a continuous process of a cyber-attack for detecting Malware intrusion and their remote connections
View Answer
True
46. A ________ is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection.
View Answer
VPN
No comments:
Post a Comment