Certified Cyber Warrior (CCW) v3.1 Batch #06 Assessment 01

  • Total 35 Points

  • Attempt All Questions

  • No Negative Marking

Start Quiz

Which of the following defines Vulnerability the best?

A protective measure

A weakness in the system

A potential negative harmful occurrence 

None of the Above

Fabrication of data affects which aspect of information security?

Confidentiality

Integrity

Availability

Which of the following method is used to store passwords securely in database servers?

Encoding

Encryption

Hashing

Obfuscation

Which of the below listed item are not phishing attack?

Whaling

Spear Phishing

PreTexing

Shoulder Surfing

The mandatory process used to verify the identity of the user and restrict illegitimate users to access the system is called as_______

Authentication

Authorization

Auditing

None of the Above

Which of the following is not an authentication technique?

Biometric

Password

Face Recognition

Logging In

Compilers and Editors software comes under which type of software?

Confidentiality Integrity Accountability

Confidentiality Integrity Availability

Confidentiality Integrity Adaptability

None of the Above

Which layer of security deal with computer devices?

Communication Security

Information Security

Application Security

None of the Above

A protective measure is to ___________________?

Protect against threat

Safeguard

Secure vulnerability

Support threat actor

Which is not a social engineering attack vector?

Advanced Persistent Threat

Shoulder Surfing

Water holing

Brute Forcing

All of the above

None of the above

Hello employee_I am the director of this organization Could you please send me the data if have asked you to collect yesterday? What type of phishing attack is this?

Whaling

Spear Phishing

Phone Vishing

Pre Texting

Which section is responsible for Cyber Terrorism?

66A

66D

66F

66H

When was Personal Data Protection Bill expected?

2017

2018

2019

2020

What are the two important issues addressed while reviewing policies and laws?

Confidentiality & integrity

Confidentiality & privacy

Confidentiality & Authenticity

None of the above

When a computer is shutdown can a volatile data be retrieved?

Yes

No

What is the device that is used to copy data from an evidence?

Write-copier

Write-assessor

Write-Blocker

Writer

What is the mechanism used for checking the file integrity post copying data from an evidence?

Hashing

Checksum

Checksum with right protection

Checksum with read only

What is the most important information that is accessed first during an investigation in an evidence?

Passwords

Sysfiles

Logs

Applications

PGP stands for?

Pretty Good Privacy

Pretty Good Protection

Properly Guided Protection

Properly Gained Privacy

overriding effect falls under section__________

81

70B

79A

65

A ________ attack is a method to discern the password pattern of a touch screen device such as a cell phone or tablet computer

Social Engineering Attack

Smudge

Phishing

Tailgating

What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds?

Cracking or illegally hack into any system

Putting antivirus into the victim

Stealing data

Stealing hardware components

What is the proposed punishment for Cyber Terrorism in IT Act?

Life Imprisonment

1 Crore rupees penalty

10 year imprisonment

06 year imprisonment

This is an encryption-decryption key known only to the party or parties that exchange secret messages

E-Signature

Digital Certificate

Private Key

Security Token

The key to a successful physical protection system is the integration of?

People procedures and equipment

Technology risk assessment and human interaction

Protecting off-setting and transferring risk

Detection deterrence and response

What is the primary objective of controlling entry into a facility or area?

Provide time management controls for all employees

Ensure that only authorized persons are allowed to enter

Keep potential hazards and contraband material out that could be used to commit sabotage

Identification purposes

What are the elements of a physical protection system?

Determine Direct Dispatch and Report

Determine Detect Delay and Response

Display Develop Initiate and Apprehend

Evaluate Determine Dispatch and Detain

Which of the following is not an component of physical security?

Access control

Surveillance

Gateway Security

Testing

The problem of Tailgating can be solved by ____________

Fences

Mantraps

Bollards

Gates

Which among the following is not an vulnerability of ATM?

Physical Security

Malware

Skimming

Virus

Which of the following is not an area of concern for physical security?

Securing a site

Protecting in against to hackers

Protecting a property

Protecting an equipment

Which among the following does not belong to access control?

Restricting work areas

Perimeter security

Escort requirements

Visitor control

Which of the following are categories of intrusion detection devices?

Perimeter intrusion detectors

Motion detectors

Both of the above

Neither of the above

___________ provide the means to create capability that reflects true awareness of the physical world and people

Sensors

Heterogeneity

Security

Connectivity

Which boundary Protection provides security against vehicle ramming into or stopping near the building?

Gates

Bollards

Fences

Shrubs

Quiz/Test Summary
Title: Certified Cyber Warrior (CCW) v3.1 Batch #06 Assessment 01
Questions: 35
Contributed by: