Aktu quiz 1-answer computer system security

Aktu  Computer System Security  Answer- 1






Question 1 -  What was the percentage increase in Zero Day Vulnerabilities in the year 2015 ?

  • 4%
  • 50%
  • 100%
  • 125%

Question 2 -  Identify the software whose vulnerability is exploited the most ?

  • Android
  • Browser 
  • Adobe Flash Player
  • Microsoft Office


Question 3 -  The computer vulnerabilities and exploits databases are maintained by _________.

  • Kaspersky Lab
  • Symantec Corporation
  • MITRE Corporation
  • None of the above


Question 4 - Which of the following is/are correct with respect to Ransomware?

  • It is a form of Malware
  • It encrypts the whole hard drive of the computer, essentially locking the user out of the entire system.
  • It locks the system's screen or locks the users' files unless a ransom is paid.
  • All of the above.


Question 5 - What hacking attacks were mentioned in the lesson ?

  • Hacking in French Election
  • ATM Hacking in India
  • Denial of Service attack in Turkish Bank
  • All of the above


Question 6 -  Which of the following is not an advantage of studying Cyber Security ?

  • It gives you the ability to hack a computer system
  • It allows you to know the ways through which cyberspace can be breached
  • Both A and B
  • None of the above


Question 7 - Which of the following is considered legal ?

  • Hacking a social media account and sending a private message
  • Hacking a bank account and siphoning funds
  • Hacking a company’s security system with permission from the management
  • All of the above


Question 8 - What is the cost of launching Denial of Service attack on a website ?

  • $20/hr
  • $100/day
  • $300/mont
  • Both A and B


Question 9 - Which of the following is correct for silent banker ?

  • It is a trojan horse
  • It records keystrokes, captures screens and steals confidential banking credentials and sends them to a remote attacker
  • Both A and B
  • None of the above
  • Question 10 - Which of the following is not a part of Security System Centric Design ?

    • Policy
    • Agreement
    • Mechanisms
    • Threat Models


    Question 11 - Which of the following is not a goal in the security system design ?

    • Vulnerability.
    • Confidentiality
    • Integrity
    • Availability


    Question 12 - Which of the following is most important in design of secure system ?

    • Assessing vulnerability
    • Changing or Updating System according to vulnerability
    • Both A and B.
    • None of the above


    Question 13 - Which of the following is correct with respect to Penetration testing ?


  • It is an internal inspection of Applications and Operating systems for security flaws.
  • It is an authorized simulated cyber-attack on a computer system, performed to evaluate the security of the system.
  • It is hacking a security system of an organization.
  • All of the above


Question 14 - Which of the following is to be done to avoid limitations in threat models ?

  • Making more explicit and formalized threat models to understand possible weaknesses
  • Making simpler and more general threat models
  • Making less assumptions to design a better threat model
  • All of the above.




Comments

Popular posts from this blog

AKTU : 9 Computer System Security Quiz answer

AKTU : 8 Computer System Security Quiz answer

T20 squad team