Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

CYBER QUIZ

Q1. AFM _______________ Chapter -3 deals with Password Security.


(a) 82-4 (b) 82-5 (c) 10-1 (d) All of these
Q2. On PAF Secure LAN, password should be having a minimum ____
characters length.
(a) 5 (b) 7 (c) 8 (d) 12
Q3. Data encryption software is _______________.
(a) Post Guard (b) PAF Crypt (c) PAF Mail (d) All of these
Q4. Passwords on non-Secure LANs / isolated PCs should be having a
Minimum of _______ characters length.
(a) 5 (b) 7 (c) 8 (d) 9
Q5. Passwords related to information systems are to be shared to unauthorized
users. True / False
Q6. Any observance of ICT violation must be reported to respective Unit
ISO, NOC AHQ Islamabad and Directorate of ________________.
(a) IS (Cmd) (b) IS (Dev) (c) Dte of NCW (d) Dte of CyW
Q7. Personnel desirous of publishing their own websites are to follow procedure
in accordance with Chapter-11 of AFM__________.
(a) 10-1 (b) 82-3 (c) 82-4 (d) 82-5
Q8. Devices containing Top Secret / Secret (Accountable, Copy numbered or
Sensitive) information to be dealt with in accordance with AFO 20-25 and AFM
______.
(a) 12-1 (b) 10-1 (c) 82-4 (d) 82-5
Q9. Official mail classified as “Secret (copy numbered) and Top Secret” will be
transmitted through PAF Mail v2. True / Flase
Q10. Official mail classified as “Secret (not copy numbered) and below secret”
will be transmitted through _____________.
(a) E-Courier (b) PAF Mail (c) Post Gaurd (d) All of these
Q11. Minor security incidents (SI) would be handled locally by the respective
Director / Commanding Officer and reported as described in the Incident
Reporting Procedure. True / False
Q12. Only Registered USB used for data transfer in own Unit / sections PC for
Official use. True / False
Q13. Online IT Complaint System available on PAF Intranet, under SW APP tab
in ______________.
(a) Admin (b) Support (c) OPS (d) C4I
Q14. AFO ________ Security of Information Systems in PAF.
(a) 12-1 (b) 10-1 (c) 82-4 (d) 82-5
Q15. Users having ownership of information, application or physical
asset would be considered as _____________.
(a) Owners (b) Users (c) Administrators (d) Custodians
Q16. AFM 12-1 Chapter_______ deals with incident handling / management.
(a) 5 (b) 9 (c) 10 (d) 12
Q17. Report the incident by raising a form given at AFM 12-1 Appendix ____ and
sending it to the Directorate of Cyber Warfare.
(a) A (b) B (c) C (d) D
Q18. Users handling or processing data of their respective domain.
(a) Admin (b) Custodian (c) Managers (d) Application Owners
Q19. ___________ are the Users designated by their respective Unit / Dte for
managing registered ESDs and ensure smooth functioning of PCs of respective
Unit.
(a) ISOs (b) Custodian (c) Data Owners (d) Application Owners
Q20. All organizations outside the PAF and accessing the PAF Intranet limited /
restricted version through access control policy.
(a) Non-Secure LAN (b) Extra-net LAN (c) Secure-net (d) Isolated LAN

You might also like