0% found this document useful (0 votes)
466 views20 pages

Cat Exams Out of 70

The document discusses various topics related to information security management and cyber security. It contains multiple choice questions about key components of an information security policy, mechanisms for raising security awareness, data classification controls, threats to businesses, logical access controls, technical exposures, definitions of cyber security, objectives of network security, types of cybercrimes and cyber attacks, components of cyber security, and advantages and disadvantages of cyber security.

Uploaded by

Bashir Destin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
466 views20 pages

Cat Exams Out of 70

The document discusses various topics related to information security management and cyber security. It contains multiple choice questions about key components of an information security policy, mechanisms for raising security awareness, data classification controls, threats to businesses, logical access controls, technical exposures, definitions of cyber security, objectives of network security, types of cybercrimes and cyber attacks, components of cyber security, and advantages and disadvantages of cyber security.

Uploaded by

Bashir Destin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

MUSA BASHIR

BSCLMR178021
CAT 1,2 AND 3
INFORMATION SECURITY MANAGEMENT
1. To retain a competitive advantage and to meet basic business requirements
organizations must:

A. Ensure the integrity of the information stored on their computer systems


B. Preserve the confidentiality pf sensitive data
C. Ensure the continued availability of their information systems
D. Ensure conformity to laws, regulations and standards
E. All of the above
2. The key components of an information systems security policy include:

A. Management support and commitment


B. Access Authorization
C. Security Awareness
D. All of the above
3. A number of different mechanisms are available for raising security awareness
including:

A. Distribution of a written security policy


B. Training on a regular basis of new employees, users
C. Both A&B
D. None
4. Data classification as a control measure should define:

A. Who has access rights


B. Who is responsible for determining the access rights and access levels
C. What approvals are needed for access
D. Computer crime issues and exposures
E. All of the above
5. Threats to businesses include:

A. Financial loss, Legal repercussions


B. Loss or credibility or competitive edge
C. Disclosure of confidential, sensitive or embarrassing information, Industrial
espionage
D. All of the above
6. Logical access controls are one of the primary safeguards for securing software
and data within an information processing facility.
A. True
B. False
7. Technical exposures are the unauthorized implementation or modification of data
and software at the network, platform, database or application level. They
include:

A. Data diddling involves changing data before or as they are entered into the
computer.
B. Trojan horses involve hiding malicious, fraudulent code in an authorized
computer program.
C. Wire-tapping involves eaves dropping on information being transmitted over
telecommunications lines
D. All of the above
. 8 What is Cyber Security?
a) Cyber Security provides security against malware
b) Cyber Security provides security against cyber-terrorists
c) Cyber Security protects a system from cyber-attacks
d) All of the mentioned

9 What does cyber security protect?


a) Cyber security protects criminals
b) Cyber security protects internet-connected systems
c) Cyber security protects hackers
d) None of the mentioned

10 Who is the father of computer security?


a) August Kerckhoffs
b) Bob Thomas
c) Robert
d) Charles

11 Which of the following is defined as an attempt to steal, spy, damage or destroy computer
systems, networks, or their associated information?
a) Cyber-attack
b) Computer security
c) Cryptography
d) Digital hacking

12 Which of the following is a type of cyber security?


a) Cloud Security
b) Network Security
c) Application Security
d) All of the above

13 What are the features of cyber security?


a) Compliance
b) Defense against internal threats
c) Threat Prevention
d) All of the above

14 Which of the following is an objective of network security?


a) Confidentiality
b) Integrity
c) Availability
d) All of the above

15 Which of the following is not a cybercrime?


a) Denial of Service
b) Man in the Middle
c) Malware
d) AES

16. Which of the following is a component of cyber security?


a) Internet Of Things
b) AI
c) Database
d) Attacks

17. Which of the following is a type of cyber attack?


a) Phishing
b) SQL Injections
c) Password Attack
d) All of the above

19. Which of the following is not an advantage of cyber security?


a) Makes the system slower
b) Minimizes computer freezing and crashes
c) Gives privacy to users
d) Protects system against viruses

20. “Cyberspace” was coined by _________


a) Richard Stallman
b) William Gibson
c) Andrew Tannenbaum
d) Scott Fahlman

21. In which year has hacking become a practical crime and a matter of concern in the field of
cyber technology?
a) 1991
b) 1983
c) 1970
d) 1964
22. Governments hired some highly skilled hackers for providing cyber security for the
country or state. These types of hackers are termed as _______
a) Nation / State sponsored hackers
b) CIA triad
c) Special Hackers
d) Government Hackers

23. Which of the following act violates cyber security?


a) Exploit
b) Attack
c) Threat
d) Vulnerability

16. Which of the following actions compromise cyber security?


a) Vulnerability
b) Attack
c) Threat
d) Exploit

17. Which of the following is the hacking approach where cyber-criminals design fake
websites or pages for tricking or gaining additional traffic?
a) Pharming
b) Website-Duplication
c) Mimicking
d) Spamming

18. Which of the following is not a type of peer-to-peer cyber-crime?


a) MiTM
b) Injecting Trojans to a target victim
c) Credit card details leak in the deep web
d) Phishing

19. A cyber-criminal or penetration tester uses the additional data that stores certain special
instructions in the memory for activities to break the system in which of the following attack?
a) Clickjacking
b) Buffer-overflow
c) Phishing
d) MiTM

20. Which of the following do Cyber attackers commonly target for fetching IP address of a
target or victim user?
a) ip tracker
b) emails
c) websites
d) web pages
21. Which of the following is defined as an attempt to harm, damage or cause threat to a
system or network?
a) Digital crime
b) Threats
c) System hijacking
d) Cyber Attack

22. They are nefarious hackers, and their main motive is to gain financial profit by doing
cyber crimes. Who are “they” referred to here?
a) White Hat Hackers
b) Black Hat Hackers
c) Hactivists
d) Gray Hat Hackers

23. IT security in any firm or organization is maintained and handled by ______________


a) Software Security Specialist
b) CEO of the organization
c) Security Auditor
d) IT Security Engineer

24. Where did the term “hacker” originate?


a) MIT
b) New York University
c) Harvard University
d) Bell’s Lab

25. What is the existence of weakness in a system or network is known as?


a) Attack
b) Exploit
c) Vulnerability
d) Threat

26. Which of the following is an internet scam done by cyber-criminals where the user is
convinced digitally to provide confidential information.
a) MiTM attack
b) Phishing attack
c) Website attack
d) DoS attack

27. Which of the following is not a step followed by cyber-criminals in data breaching?
a) Exfiltration
b) Research and info-gathering
c) Attack the system
d) Fixing the bugs

28. Which of the following online service’s privacy cannot be protected using Tor?
a) Browsing data
b) Instant messaging
c) Login using ID
d) Relay chats

29. Which of the following term refers to a group of hackers who are both white and black
hat?
a) Yellow Hat hackers
b) Grey Hat hackers
c) Red Hat Hackers
d) White-Black Hat Hackers

30. Which of the following is not an email-related hacking tool?


a) Mail Password
b) Email Finder Pro
c) Mail PassView
d) Sendinc

30. Which of the following DDoS in mobile systems wait for the owner to trigger the cyber
attack?
a) botnets
b) programs
c) virus
d) worms

31. Which of the following is the least strong security encryption standard?
a) WPA3
b) WPA2
c) WPA
d) WEP

32. Which of the following is a Stuxnet?


a) Trojan
b) Antivirus
c) Worm
d) Virus

33. Which of the following ethical hacking technique is used for determining which operating
system (OS) is running on a remote computer?
a) Operating System fingerprinting
b) Operating System penetration testing
c) Digital-printing
d) Machine printing

34. Which of the following can diminish the chance of data leakage?
a) Steganography
b) Chorography
c) Cryptography
d) Authentication

35) In which of the following, a person is constantly followed/chased by another person or


group of several peoples?

a. Phishing
b) Bulling
c) Stalking
d) Identity theft

36) Which one of the following can be considered as the class of computer threats?

a. Dos Attack
b. Phishing
c. Soliciting
d. Both A and C

37) Which of the following is considered as the unsolicited commercial email?

a. Virus
b. Malware
c. Spam
d. All of the above

38) Which of the following usually observe each activity on the internet of the victim, gather
all information in the background, and send it to someone else?

a. Malware
b. Spyware
c. Adware
d. All of the above
39) _______ is a type of software designed to help the user's computer detect viruses and
avoid them.

a. Malware
b. Adware
c. Antivirus
d. Both B and C

40) Which one of the following is a type of antivirus program?

a. Quick heal
b. Mcafee
c. Kaspersky
d. All of the above

41) It can be a software program or a hardware device that filters all data packets coming
through the internet, a network, etc. it is known as the_______:

a. Antivirus
b. Firewall
c. Cookies
d. Malware

42) Which of the following refers to stealing one's idea or invention of others and use it for
their own benefits?

a. Piracy
b. Plagiarism
c. Intellectual property rights
d. All of the above

Show Answer Workspace


43) Read the following statement carefully and find out whether it is correct about the hacking
or not?

It can be possible that in some cases, hacking a computer or network can be legal.

a. No, in any situation, hacking cannot be legal


b. It may be possible that in some cases, it can be referred to as a legal task

44) Which of the following refers to exploring the appropriate, ethical behaviors related to the
online environment and digital media platform?

a. Cyber low
b. Cyberethics
c. Cybersecurity
d. Cybersafety

45) Which of the following refers to the violation of the principle if a computer is no more
accessible?

a. Access control
b. Confidentiality
c. Availability
d. All of the above

46) Which one of the following refers to the technique used for verifying the integrity of the
message?

a. Digital signature
b. Decryption algorithm
c. Protocol
d. Message Digest

47) Which one of the following usually used in the process of Wi-Fi-hacking?
a. Aircrack-ng
b. Wireshark
c. Norton
d. All of the above

48) Which of the following port and IP address scanner famous among the users?

a. Cain and Abel


b. Angry IP Scanner
c. Snort
d. Ettercap

49) In ethical hacking and cyber security, there are _______ types of scanning:

a. 1
b. 2
c. 3
d. 4

50) Which of the following is not a type of scanning?

a. Xmas Tree Scan


b. Cloud scan
c. Null Scan
d. SYN Stealth

51) In system hacking, which of the following is the most crucial activity?

a. Information gathering
b. Covering tracks
c. Cracking passwords
d. None of the above
52) Which of the following are the types of scanning?

a. Network, vulnerability, and port scanning


b. Port, network, and services
c. Client, Server, and network
d. None of the above

53) Which one of the following is actually considered as the first computer virus?

a. Sasser
b. Blaster
c. Creeper
d. Both A and C

54) To protect the computer system against the hacker and different kind of viruses, one must
always keep _________ on in the computer system.

a. Antivirus
b. Firewall
c. Vlc player
d. Script

55) Code Red is a type of ________

a. An Antivirus Program
b. A photo editing software
c. A computer virus
d. A video editing software

56) Which of the following can be considered as the elements of cyber security?

a. Application Security
b. Operational Security
c. Network Security
d. All of the above

57) Which of the following are famous and common cyber-attacks used by hackers to
infiltrate the user's system?

a. DDos and Derive-by Downloads


b. Malware & Malvertising
c. Phishing and Password attacks
d. All of the above

58) Which one of the following is also referred to as malicious software?

a. Maliciousware
b. Badware
c. Ilegalware
d. Malware

59) Hackers usually used the computer virus for ______ purpose.

a. To log, monitor each and every user's stroke


b. To gain access the sensitive information like user's Id and Passwords
c. To corrupt the user's data stored in the computer system
d. All of the above

60) In Wi-Fi Security, which of the following protocol is more used?

a. WPA
b. WPA2
c. WPS
d. Both A and C

61) The term "TCP/IP" stands for_____

a. Transmission Contribution protocol/ internet protocol


b. Transmission Control Protocol/ internet protocol
c. Transaction Control protocol/ internet protocol
d. Transmission Control Protocol/ internet protocol

62) The response time and transit time is used to measure the ____________ of a network.

a. Security
b. Longevity
c. Reliability
d. Performance

63) Which of the following factor of the network gets hugely impacted when the number of
users exceeds the network's limit?

a. Reliability
b. Performance
c. Security
d. Longevity

64) In the computer networks, the encryption techniques are primarily used for improving the
________

a. Security
b. Performance
c. Reliability
d. Longevity

65) Which of the following statements is correct about the firewall?

a. It is a device installed at the boundary of a company to prevent unauthorized physical


access.
b. It is a device installed at the boundary of an incorporate to protect it against the
unauthorized access.
c. It is a kind of wall built to prevent files form damaging the corporate.
d. None of the above.

66) When was the first computer virus created?


a. 1970
b. 1971
c. 1972
d. 1969

67) Which of the following is considered as the world's first antivirus program?

a. Creeper
b. Reaper
c. Tinkered
d. Ray Tomlinson

68) Which one of the following principles of cyber security refers that the security mechanism
must be as small and simple as possible?

a. Open-Design
b. Economy of the Mechanism
c. Least privilege
d. Fail-safe Defaults

69) Which of the following principle of cyber security restricts how privileges are initiated
whenever any object or subject is created?

a. Least privilege
b. Open-Design
c. Fail-safe Defaults
d. None of the above

70) Suppose an employee demands the root access to a UNIX system, where you are the
administrator; that right or access should not be given to the employee unless that employee
has work that requires certain rights, privileges. It can be considered as a perfect example of
which principle of cyber security?

a. Least privileges
b. Open Design
c. Separation of Privileges
d. Both A & C

71) Which of the following can also consider as the instances of Open Design?

a. CSS
b. DVD Player
c. Only A
d. Both A and B

72) Which one of the following principles states that sometimes it is become more desirable to
rescored the details of intrusion that to adopt more efficient measure to avoid it?

a. Least common mechanism


b. Compromise recording
c. Psychological acceptability
d. Work factor

73) The web application like banking websites should ask its users to log-in again after some
specific period of time, let say 30 min. It can be considered as an example of which
cybersecurity principle?

a. Compromise recording
b. Psychological acceptability
c. Complete mediation
d. None of the above

74) Which one of the following statements is correct about Email security in the network
security methods?

a. One has to deploy hardware, software, and security procedures to lock those apps
down.
b. One should know about what the normal behavior of a network look likes so that
he/she can spot any changes, breaches in the behavior of the network.
c. Phishing is one of the most commonly used methods that are used by hackers to gain
access to the network
d. All of the above

75) Which of the following statements is true about the VPN in Network security?

a. It is a type of device that helps to ensure that communication between a device and a
network is secure.
b. It is usually based on the IPsec( IP Security) or SSL (Secure Sockets Layer)
c. It typically creates a secure, encrypted virtual "tunnel" over the open internet
d. All of the above

76) Which of the following type of text is transformed with the help of a cipher algorithm?

a. Transformed text
b. Complex text
c. Scalar text
d. Plain text

77) The term "CHAP" stands for __________

a. Circuit Hardware Authentication Protocols


b. Challenge Hardware Authentication Protocols
c. Challenge Handshake Authentication Protocols
d. Circuit Handshake Authentication Protocols

78) Which type of the following malware does not replicate or clone them self's through
infection?

a. Rootkits
b. Trojans
c. Worms
d. Viruses
79) Which of the following malware's type allows the attacker to access the administrative
controls and enables his/or her to do almost anything he wants to do with the infected
computers.

a. RATs
b. Worms
c. Rootkits
d. Botnets

80) Which of the following statements is true about the Trojans?

a. Trojans perform tasks for which they are designed or programmed


b. Trojans replicates them self's or clone them self's through an infections
c. Trojans do nothing harmful to the user's computer systems
d. None of the above

81) Which of the following is just opposite to the Open Design principle?

a. Security through obscurity


b. Least common mechanism
c. Least privileges
d. Work factor

82) Which of the following is a type of independent malicious program that never required
any host program?

a. Trojan Horse
b. Worm
c. Trap Door
d. Virus

83) Which of the following usually considered as the default port number of apache and
several other web servers?

a. 20
b. 40
c. 80
d. 87

84) DNS translates a Domain name into _________

a. Hex
b. Binary
c. IP
d. URL

85) Which one of the following systems cannot be considered as an example of the operating
systems?

[Link] 8
b. Red Hat Linux
[Link] Linux
d. Microsoft Office

86) In the CIA Triad, which one of the following is not involved?

a. Availability
b. Confidentiality
c. Authenticity
d. Integrity

87) In an any organization, company or firm the policies of information security come
under__________

a. CIA Triad
b. Confidentiality
c. Authenticity
d. None of the above

88) Why are the factors like Confidentiality, Integrity, Availability, and Authenticity
considered as the fundamentals?
a. They help in understanding the hacking process
b. These are the main elements for any security breach
c. They help to understand the security and its components in a better manner
d. All of the above

89) In order to ensure the security of the data/ information, we need to ____________ the
data:

a. Encrypt
b. Decrypt
c. Delete
d. None of the above

90) Which one of the following is considered as the most secure Linux operating system that
also provides anonymity and the incognito option for securing the user's information?

a. Ubuntu
b. Tails
c. Fedora
d. All of the above

91) Which type following UNIX account provides all types of privileges and rights which one
can perform administrative functions?

a. Client
b. Guest
c. Root
d. Administrative

92) Which of the following is considered as the first hacker's conference?

a. OSCON
b. DEVON
c. DEFCON
d. SECTION
93) Which of the following known as the oldest phone hacking techniques used by hackers to
make free calls?

a. Phreaking
b. Phishing
c. Cracking
d. Spraining

94) Name of the Hacker who breaks the SIPRNET system?

a. John Draper
b. Kevin Mitnick
c. John von Neumann
d. Kevin Poulsen

You might also like