computer system security week 1 Quiz Answer AKTU | 2021

CSS Quiz Answer week 1 AKTU 2021




Computer System Security Week 1 Quiz Answer AKTU | 2021



Question 1)  What was the percentage increase in Zero Day Vulnerabilities in the year 2015 ?

  • 4%
  • 50%
  • 100%
  • 125%

Question 2)  Identify the software whose vulnerability is exploited the most ?

  • Android
  • Browser 
  • Adobe Flash Player
  • Microsoft Office


Question 3) The computer vulnerabilities and exploits databases are maintained by _________.

  • Kaspersky Lab
  • Symantec Corporation
  • MITRE Corporation
  • None of the above


Question 4) Which of the following is/are correct with respect to Ransomware ?

  • It is a form of Malware
  • It encrypts the whole hard drive of the computer, essentially locking the user out of the entire system.
  • It locks the system's screen or locks the users' files unless a ransom is paid.
  • All of the above.


Question 5) What hacking attacks were mentioned in the lesson ?

  • Hacking in French Election
  • ATM Hacking in India
  • Denial of Service attack in Turkish Bank
  • All of the above


Question 6) Which of the following is not an advantage of studying Cyber Security ?

  • It gives you the ability to hack a computer system
  • It allows you to know the ways through which cyberspace can be breached
  • Both A and B
  • None of the above


Question 7)  Which of the following is considered legal ?

  • Hacking a social media account and sending a private message
  • Hacking a bank account and siphoning funds
  • Hacking a company’s security system with permission from the management
  • All of the above


Question 8) What is the cost of launching Denial of Service attack on a website ?

  • $20/hr
  • $100/day
  • $300/mont
  • Both A and B


Question 9)  Which of the following is correct for silent banker ?

  • It is a trojan horse
  • It records keystrokes, captures screens and steals confidential banking credentials and sends them to a remote attacker
  • Both A and B
  • None of the above


Question 10) Which of the following is not a part of Security System Centric Design ?

  • Policy
  • Agreement
  • Mechanisms
  • Threat Models


Question 11) Which of the following is not a goal in the security system design ?

  • Vulnerability.
  • Confidentiality
  • Integrity
  • Availability


Question 12) Which of the following is most important in design of secure system ?

  • Assessing vulnerability
  • Changing or Updating System according to vulnerability
  • Both A and B.
  • None of the above


Question 13)  Which of the following is correct with respect to Penetration testing ?

  • It is an internal inspection of Applications and Operating systems for security flaws.
  • It is an authorized simulated cyber-attack on a computer system, performed to evaluate the security of the system.
  • It is hacking a security system of an organization.
  • All of the above


Question 14) Which of the following is to be done to avoid limitations in threat models ?

  • Making more explicit and formalized threat models to understand possible weaknesses
  • Making simpler and more general threat models
  • Making less assumptions to design a better threat model
  • All of the above.











Post a Comment

0 Comments