Total 35 Points
Attempt All Questions
No Negative Marking
Which of the following defines Vulnerability the best?
A protective measure
A weakness in the system
A potential negative harmful occurrence
None of the Above
Fabrication of data affects which aspect of information security?
Confidentiality
Integrity
Availability
Which of the following method is used to store passwords securely in database servers?
Encoding
Encryption
Hashing
Obfuscation
Which of the below listed item are not phishing attack?
Whaling
Spear Phishing
PreTexing
Shoulder Surfing
The mandatory process used to verify the identity of the user and restrict illegitimate users to access the system is called as_______
Authentication
Authorization
Auditing
None of the Above
Which of the following is not an authentication technique?
Biometric
Password
Face Recognition
Logging In
Compilers and Editors software comes under which type of software?
Confidentiality Integrity Accountability
Confidentiality Integrity Availability
Confidentiality Integrity Adaptability
None of the Above
Which layer of security deal with computer devices?
Communication Security
Information Security
Application Security
None of the Above
A protective measure is to ___________________?
Protect against threat
Safeguard
Secure vulnerability
Support threat actor
Which is not a social engineering attack vector?
Advanced Persistent Threat
Shoulder Surfing
Water holing
Brute Forcing
All of the above
None of the above
Hello employee_I am the director of this organization Could you please send me the data if have asked you to collect yesterday? What type of phishing attack is this?
Whaling
Spear Phishing
Phone Vishing
Pre Texting
Which section is responsible for Cyber Terrorism?
66A
66D
66F
66H
When was Personal Data Protection Bill expected?
2017
2018
2019
2020
What are the two important issues addressed while reviewing policies and laws?
Confidentiality & integrity
Confidentiality & privacy
Confidentiality & Authenticity
None of the above
When a computer is shutdown can a volatile data be retrieved?
Yes
No
What is the device that is used to copy data from an evidence?
Write-copier
Write-assessor
Write-Blocker
Writer
What is the mechanism used for checking the file integrity post copying data from an evidence?
Hashing
Checksum
Checksum with right protection
Checksum with read only
What is the most important information that is accessed first during an investigation in an evidence?
Passwords
Sysfiles
Logs
Applications
PGP stands for?
Pretty Good Privacy
Pretty Good Protection
Properly Guided Protection
Properly Gained Privacy
overriding effect falls under section__________
81
70B
79A
65
A ________ attack is a method to discern the password pattern of a touch screen device such as a cell phone or tablet computer
Social Engineering Attack
Smudge
Phishing
Tailgating
What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds?
Cracking or illegally hack into any system
Putting antivirus into the victim
Stealing data
Stealing hardware components
What is the proposed punishment for Cyber Terrorism in IT Act?
Life Imprisonment
1 Crore rupees penalty
10 year imprisonment
06 year imprisonment
This is an encryption-decryption key known only to the party or parties that exchange secret messages
E-Signature
Digital Certificate
Private Key
Security Token
The key to a successful physical protection system is the integration of?
People procedures and equipment
Technology risk assessment and human interaction
Protecting off-setting and transferring risk
Detection deterrence and response
What is the primary objective of controlling entry into a facility or area?
Provide time management controls for all employees
Ensure that only authorized persons are allowed to enter
Keep potential hazards and contraband material out that could be used to commit sabotage
Identification purposes
What are the elements of a physical protection system?
Determine Direct Dispatch and Report
Determine Detect Delay and Response
Display Develop Initiate and Apprehend
Evaluate Determine Dispatch and Detain
Which of the following is not an component of physical security?
Access control
Surveillance
Gateway Security
Testing
The problem of Tailgating can be solved by ____________
Fences
Mantraps
Bollards
Gates
Which among the following is not an vulnerability of ATM?
Physical Security
Malware
Skimming
Virus
Which of the following is not an area of concern for physical security?
Securing a site
Protecting in against to hackers
Protecting a property
Protecting an equipment
Which among the following does not belong to access control?
Restricting work areas
Perimeter security
Escort requirements
Visitor control
Which of the following are categories of intrusion detection devices?
Perimeter intrusion detectors
Motion detectors
Both of the above
Neither of the above
___________ provide the means to create capability that reflects true awareness of the physical world and people
Sensors
Heterogeneity
Security
Connectivity
Which boundary Protection provides security against vehicle ramming into or stopping near the building?
Gates
Bollards
Fences
Shrubs