Looking For Anything Specific?

ads header

Computer System Security Quiz 1 Answers

 


  

Programmer for Noobs

CSS Quiz 1 Answers

Q1. What was the percentage increase in Zero Day Vulnerabilities in the year 2015?

1.4%

2.50%

3.100%

4.125%

Reason: As per the lectures and statics of year 2015 there were a increase of 125% from the previous year.

Programmer for Noobs

Q2. Identify the software whose vulnerability is exploited the most?

1.Android

2.Browser

3.Adobe Flash Player

4.Microsoft Office

Reason: Android is the most vulnerable operating system because it is very to be exploit and create malware in the system.

Programmer for Noobs

Programmer for Noobs

Q3. The computer vulnerabilities and exploits databases are maintained by _________.

1.Kaspersky Lab

2.Symantec Corporation

3.MITRE Corporation

4.None of the above

Reason: Kaspersky lab is responsible for maintaining any type of vulnerability and exploit in a computer system.

Programmer for Noobs

Q4. Which of the following is/are correct with respect to Ransomware?

1.It is a form of Malware

2. It encrypts the whole hard drive of the computer, essentially locking the user out of the entire system.

3.It locks the system's screen or locks the users' files unless a ransom is paid.

4.All of the above

Reason: Ransomware is a type of malware which enters to our computer system and encrypts the whole hard disk as well as all the user access and doesn’t unlock until the user pays some ransom in return of unlocking and decrypting the system.

Programmer for Noobs

Q5.  What hacking attacks were mentioned in the lesson?

1.Hacking in French Election

2.ATM Hacking in India

3.Denial of Service attack in Turkish Bank

4.All of the above

Reason:  All the above attacks were mentioned in the lessons.

Programmer for Noobs

Q6. Which of the following is not an advantage of studying Cyber Security?

1.It gives you the ability to hack a computer system

2.It allows you to know the ways through which cyberspace can be breached

3.Both A and B

4.None of the above

Reason: None of the option I correct because studying cyber security gives us brief idea that how can we prevent from the attacks and helps the society to prevents from the hazardous attack.

Programmer for Noobs


Programmer for Noobs

Q7.  Which of the following is considered legal?

1.Hacking a social media account and sending a private message

2.Hacking a bank account and siphoning funds

3.Hacking a company’s security system with permission from the management

4.All of the above

Reason: If we take permission from the management to perform the specific attack then it is legal to perform as now we are not harming any organization or there data and the attack is performed under the provision of the company or organization.

Programmer for Noobs

Q8.  What is the cost of launching Denial of Service attack on a website?

1.$20/hr

2.$100/day

3.$300/mont

4.Both A and B

Reason: The cost of launching Denial of service attack on a website can have cost of 20$/hr or 100$/day

Programmer for Noobs

Q9. Which of the following is correct for silent banker?

1.It is a trojan horse

2.It records keystrokes, captures screens and steals confidential banking credentials and sends them to a remote attacker

3.Both A and B

4.None of the above

Reason: A trojan horse because it captures our screen and steal confidential information and credentials as well our keystrokes and send them to remote attacker.

Programmer for Noobs

Q10. Which of the following is not a part of Security System Centric Design?

1.Policy

2.Agreement

3.Mechanisms

4.Threat Models

Reason: Agreement is not a part of security system centric design.

Programmer for Noobs



Q11. Which of the following is not a goal in the security system design?

1.Vulnerability

2.Confidentiality

3.Integrity

4.Availability

Reason: Vulnerability kill our system security, confidentiality and integrity so that why it is not a goal in security system design.

Programmer for Noobs

Q12. Which of the following is most important in design of secure system?

1.Assessing vulnerability

2.Changing or Updating System according to vulnerability

3.Both A and B

4.None of the above

Reason: Assessing vulnerability and changing or updating system according to the vulnerability  is very important.

Programmer for Noobs



Programmer for Noobs

Q13.  Which of the following is correct with respect to Penetration testing?

1.It is an internal inspection of Applications and Operating systems for security flaws.

2.It is an authorized simulated cyber-attack on a computer system, performed to evaluate the security of the system

3.It is hacking a security system of an organization.

4.All of the above

Reason: We need all the above mentioned to perform penetration testing.

Programmer for Noobs

Q14.  Which of the following is to be done to avoid limitations in threat models?

1.Making more explicit and formalized threat models to understand possible weaknesses

2.Making simpler and more general threat models

3.Making less assumptions to design a better threat model

4.All of the above

Reason: We should keep all the mentioned points in our mind to avoid limitations in threat model

Programmer for Noobs

Please subscribe to our channel 


Post a Comment

0 Comments