Professional Documents
Culture Documents
Scsu PDF
Scsu PDF
ESET
Which of the following
Avast! Mobile Mobile Python
is not a mobile 360 Security Python Protection
Security Security & Protection
antivirus?
Antivirus
Installing
the
computer in
Out of the following, Installing a UPS Updating
a location
which is not the (Uninterruptibl the
where
correct step to protect Creating a e Power operating Updating the operating
damage due
computer and the data backup Supply) to have system on system on a timely basis
to natural
stored on them against a battery a timely
factors can
natural threats? backup basis
be
minimised
or avoided.
Directly Officially
Data can be generated Externally and Explicitly and
and and Explicitly and Implicitly
in two ways: Internally Implicitly
Indirectly Unofficially
Checking
whether the Checking
Which of the following site is secured whether a Checking Checking
is not the correct using Secure website has a the name the domain Checking the name of
method for identifying Socket Layer lock icon of the of the the website
a secure website? (SSL) before their website website
technology or URLs.
not.
Which of them is not a
category of computer MAN WAN VPN SAN SAN
networks?
Out of the following,
Sophos Email Netcraft
which is a filter that PhishTank Spamihilator Spamihilator
Appliance Toolbar
removes spam mails?
What is 'S' in HTTPS? Secure Salient Safe Simple Secure
The act of
searching
The act of
The act of A wireless for
minimising
making the network access unsecured A wireless network
the
possibility for point that Wi-Fi access point that
What does the term possibility of
hackers to impersonates a networks impersonates a
‘evil twin’ refer to? a hacker
gain easy legitimate by an legitimate wireless
accessing
access to their wireless access individual access point
your
networks point in a
network
moving
vehicle
Protecting
The
all your
conversion of The conversion Authorisatio The conversion of digital
files by
Encryption refers to: digital data to of analog to n to access data to another form or
assigning
another form digital data code
password
or code
s to them
Decrypted
What is ciphertext? Encrypted Text Plain Text Hidden Data Encrypted Text
Text
Reading,
Fraudulent
obstructin
Gaining access practice of
Surveillance g or Fraudulent practice of
What do you mean by to sensitive using the
without stealing using the identity of
Identity Theft? and personal identity of
consent personal another person
information another
informati
person
on
Out of the following
methods, which one
backs up only the
Incremental Mirror Differential
changed files and new Full Backup Incremental Backup
Backup Backup Backup
files created since the
last incremental or full
backup?
What is the name of a Windows
Microsoft Windows Mcafee
built-in antivirus for Threat Windows Defender
Protection Defender Antivirus
Windows 10? Protection
Sites
Sites made for made to
routing users access Sites visited Sites made for routing
Sites that are
What are Stealth Sites? to the wrong your in incognito users to the wrong and
hidden
and affected private mode affected sites
sites informati
on
Which of the following Location of
Technolog
does not contribute in Data data centres
Data y
compromising the Ownership and Technology Drawbacks
Migration Drawback
privacy of data stored Issues permanency
s
on cloud? of data
A network that
connects all devices in
your home to the LAN MAN HAN VPN HAN
Internet and to each
other is known as:
_____ transaction
refers to any
Cloud Digital Virtual Electronic Digital
transaction that uses
electronic medium.
Which of the following
data backup method Differential Full Incremental
Mirror backup Full backup
utilises maximum backup backup backup
storage space?
An
A firewall An open Operating
developed by An open source source system An open source web
What is Firefox?
Mozilla antivirus web developed browser
foundation browser by Mozilla
foundation
Which of the following UI
User Interface UI Redress Cursorjackin
is not an alias for Redressin Cursorjacking
Redress attack attack g
Clickjacking? g
A basic
Representat
Interpreted, unit which
In context of data, Collection of ion of
organised and leads to Interpreted, organised
what is an facts and conditions,
structured the and structured data
information? figures ideas or
data creation
objects
of data
______ is a device or
software that allows Encryptio
Antispam Zombie Packet
eavesdropping on n Packet Sniffer
Tool Computer Sniffer
traffic moving between Detection
computers.
Online data backup is Internet Online Web
Cloud Storage Cloud Storage
also known as: Storage Storage Storage
Apart from the Lock
option, what other
option can be used to
lock your PC when you Sleep Power Settings Accounts Sleep
want to leave your
device for a little
while?
Unforesee
Which of the following Unsolicited
Undetectable n Solicited Unsolicited Commercial
is another name for a Commercial
Cheat Engine Circumsta Bulk Email Email
spam? Email
nces
Excepted
When an untrusted
device gains access to
another mobile device
Backdoor None of the
via Bluetooth to collect Bluesnarfing MITM attack Backdoor hacking
hacking above
the data of the latter,
this practice is known
as:
Searching for
unsecured Wi-Fi
networks by an
individual in a moving
LAN driving War Driving Misconfig WAN driving War Driving
vehicle, using a
uration
computer and an
802.11 wireless LAN
adapter is known as:
the act of
hiding the
IP address the act of
the act of to mislead copying
the act of the act of hiding the IP
securing IP the target someone
obtaining address to mislead the
address to computer else's IP
proxies in target computer to think
IP Spoofing refers to: protect from to think address in
order to access that it is receiving data
cyberattacks that it is order to
unwanted from a trusted computer
that may harm receiving hide one's
websites. or host.
the computer. data from true
a trusted identity.
computer
or host.
An
An operating A Software
antivirus
system that is designed to
that A Software designed to
designed to block
prevents An block unauthorised
protect other unauthorised
What is a firewall? the encrypted IP access to a computer
operating access to a
system address over a network or the
systems from computer over
from Internet
unauthorised a network or
cyberatta
access the Internet
cks
Which of the following
is a web browser that
Chrome
is specially designed KidZee KidZui Google Plus KidZui
Kids
for kids to show
filtered results?
Distribute
Which of the following d
Distributed Software
are not the benefits Software Enhanced
Higher Speed Reduced Cost and Hardware
associated with and Security
Management
computer networks? Hardware
Managem
ent
Using two
Storing and
storage Copying Inspecting
maintaining Copying important data
Data backup refers to devices for important data external
data in a to preserve it as an
the process of: the same data to preserve it devices
storage alternate
in a same as an alternate for a
facility
place threat
Man-In-
What does MITM Monitor-In- Meet-In-The- None of the
The- Man-In-The-Middle
stands for? The-Middle Middle above
Middle
Attacks that involve
attempts by an
intruder to monitor a
communication for Implicit Direct Active
Passive Threats Passive Threats
stealing sensitive Threats Threats Threats
information that two
devices transmit over a
network is known as:
What is a built-in
BitLocker
security feature of Windows
Bitmap Drive Drive BitLocker Drive
Windows OS that Drive VeraCrypt
Encryption Encryptio Encryption
encrypts the hard drive Encryption
n
on your computer?
Pediatric Patent
Point-to-Point PowerPoi
What does PPTP stands Preclinical Periodical Point-to-Point Tunneling
Tunneling nt
for? Testing Trust Protocol
Protocol Presentati
Program Partnership
on
Never
In the context of file New
Never Try New Tools for Tested New Technology File
encryption tools, what Technology
Free Systems Storage File System
does NTFS stands for? File System
System
Blocking
Giving a Authenticating the user Checking
Digital signature helps Authenticating the
unique look to the identity of from the mail for
in: identity of the sender
an email the sender accessing malware
the mail
How many types of
architecture is involved
Two Three Four Five Four
in cloud
implementation?
A real-time
intervention in the
personal conversation Encryptio Eavesdroppi
Spamming Identity Theft Eavesdropping
of others over an n ng
electronic medium is
known as:
that is
confined
to a small
that spans geographi
over a large that usually cal area that is based that spans over a large
Wide Area Network
geographical spans a large such as a on the client- geographical area, such
(WAN) refer to a
area, such as a campus or an school, server as a country or the
network:
country or the entire city office, or architecture entire world
entire world multiple
offices
within a
campus
Use of wireless
communication
technology that
Over-the-
facilitates transmission Bluetooth Wi-Fi
air Online Over-the-air
and reception of communicatio communicatio
communi Transaction communication
transactions among n n
cation
devices without being
connected physically is
known as:
Public Key Man-in-the-
Infrastructure (PKI) middle Man-in-the-middle
DoS & DDoS IP Spoofing Spams
based authentications attack attack (MITM)
are used to tackle: (MITM)
to create
to block every to authenticate to
network to authenticate every
Employ Network connection every device implement
segments device before
Access Control (NAC) is that is before strong
to prevent establishing any
used______ suspected to establishing encryption
eavesdrop connection
be harmful any connection policy
ping
Ashley
Which of the following Madison Panama
Google Hack Yahoo Hack Google Hack
is not a cyberattack? Data Papers
Breaches
Data cannot be
None of the
securely protected on External Drive Local Drive Network Network
above
a:
Which of the following
allows a connection
over the air between
All of the
two systems to be SSL/TLS HTTPS VPN SSL/TLS
above
encrypted, making the
data unreadable to
attackers?
PGP is a software used Pretty
for protecting Pretty Good Pretty Good Good Pretty Good
Pretty Good Privacy
electronic mails. Its full Privacy PracticeProtectio Project
form is: n
Maintena Precaution>
Which is the correct
Precaution>> Maintenance nce >> > Precaution>>
order of steps for
Maintenance >> Reaction>> Precautio Reaction>> Maintenance >>
implementing data
>> Reaction Precaution n>> Maintenanc Reaction
security?
Reaction e