Download as pdf
Download as pdf
You are on page 1of 31
1. Which of the following is the preventive method against identity theft ? +O Users should set browser security seting to medium high > Use only crome browser to surf intemet ‘Never login in any website over intemet for any work Avoid using internet in working hours =a <= Click on number tile for review aft Save the option, click on "Save & Co b © TRUE 3. What is the best option for AV (Anti Virus)scanning a. © Configure it as per your convenience b. @ Dont change the settings configured by bank's AV team, cc. O Put off the scanning while you are working 4. O None of these Sn Slr Gut GHEEEE Click on number tile To Save the option, click + got leaked which was available pting (XSS) attacks in which 1 sf can not be mit Users should access internet for bus Awareness about the An acceptable w © Both B and C P Type here to search De RC Ld \s tricked to click on a bei n team, After few d: tink portant n golu?s a succesful Cross Site f found that it was 5. You need to access an internet site which is unofficial which is not opening in the Branch desktop? What will you do? a © Connect a Dongle to the Branch PC and use the 1 b, © Use a Broadband connection and connect to Branch LAN Use a Broadband connection in a standalone PC Refiain from doing anyone of the above as they ate against Bank Policy Click on number til To Save the option, click 6. Entails analyzing the data that the organization retains, determining its importance and value, and then assigning it to a category. 2.\@ Data classification b. © Pursing/Clearing €. ©. Media encryption software dO None of the above = =o 7. What should an employee do if he/she observed or suspect information/eyber security events or weakness in system? 2\Q_ He/She is can report the event as per his/her own will b. ©, End users should communicate directly with any regulatory and statutory authorities ¢ @ He/she should follow cyber security incident handling and reporting SOP. dO, Avoiding incident as this is not his/her concer. 9. Any digital content which any individual creates and is not acceptable to the society, it?s a cyber-crime that comes under of IT Act. 20 Section 65 & b. © Section 66 ¢ O Section 67 dO Section 68 x — Criminal organizations, Black hat hackers, malware developers, cyber terrorists © Criminal organizations, White hat hackers, malware dev ‘elopers, cyber terrorists ©, Criminal organizations, Black hat hackers, software developers, cyber-terrorists 4. © Criminal organizations, gray hat hackers, Malware develapers, Penetration testers the entity for issuing digital certificates. b. © Certified Authority (CA) O Clyitied Authorization (CA) 4. © Certificate Authorization (CA) Sao Cao Mat Ror oar’ eee 14. What all policies are available to the end users to report security violations Me bones poi) i 4. OQ. None of the above Click on numbet To Saye the option, cl Mees Te bi ok aa Ca eR cd 15. Which is the most approp te method to prevent unauthorized access to-your desktop if yon are leaving your work station for a short duration Bs © Lock the desktop using Windows key +L 2. Cover the workstation with some object Lock the system with iron chain and lock Shut down the desktop x= == BE Po | aT TR Se ile Deciiad Pi Ca LO RL unr 16. Which of the following is defined as an attempt to harm, damage or cause threat to a system or network? By 2 O Digital crime b. © Cyber Amack ¢ © System hijacking ), Threats mae is a combined term which encompasses 3 sub- pillars; information privacy, individual privacy, and communication privacy. a O Digital integrity b. O Digital secrecy Digital privacy dO Digital protection 19. Which of the following is the hacking approach where cyber criminals design fake websites or pages for tricking or gaining additional traffic? a ® Pharming '». ©. Website Duplication Ue 4 ©, Sramming aan ss <= te Click on number tilt To Save the option, click 20. Which of the following is not on OWASP's top 10 web application security risks a © Sensitive data exposure b. O. XML external entities © Noncompliance 4. ©. Insecure deserialization (Small Password b. ® Good Password O Set histher name as Password Easy Password = | PF Type here to search i Era oO 7 Cuan ees Oar 22. CONFIDENTIALITY of information implies a. © Not providing information to anyone, Bb. © Protecting information from unauthorised disclosures € © Storing iteration in aston root dO Stamping ?Private and Confidential” on customer files xr =< 23. IS policy is aligned to which of the following standards 4. 2 18027001 &.O Mist &. © Both ofthe above 4, © None of the above eee Ue eR rey 24. Which of the following is an example of passive attack? Ba © Telephonic calls to target victim ‘i (Attacker as a fake person for Help Desk support ¢ © Talkcto the target user in person 4. © Search about taryet records in online people database P Type here to search 25.53% involves scams where an indiv to-a person (the target a O Phishing tual (usually an attacker) lie * vietim) to acquire privilege data. & Q Pretexing ¢ O Spamming 3..OF Vishing 26. Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information? a @ Cyber attack b. O Computer security ¢ ©. Cryptography 4. O Digital backing & Click ono To Save the opt 28. Data ed to ensure confidentialit a © Encryption b 4 © Locking O Deleting Backup 29. One who disclose information to public of a company, organization, firm, government and private agency and he/she is the member or employee of that organization; such individuals are termed as a. Q Sponsored hackers © Crackers ¢ O Hactivist 4 © Whistleblowers x= <= 30. deals with the protection of an individual?s information which is implemented while using the Internet on any computer or personal device. a O Digital agony & © Digital privacy ¢ O Digital secrecy 4 O Digital protection Sx —_coo 26. Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information? a © Cyber attack b © Computer seciiy © © Cropoaraphy 4. © Digital hacking LA VW WA 4M

You might also like