Sie sind auf Seite 1von 7

Secure Computer User (CSCUv2) Secure Computer User (CSCUv2)

PRE-ASSESSMENT QUESTIONS PRE-ASSESSMENT QUESTIONS

6. Jack recently purchased a new laptop. In order to keep his laptop secure, he installed
antivirus software on it. However, he does not know whether the antivirus software is
1. Which of the following elements of security refers to ensuring that information working. Which test should he perform to check whether the antivirus is working?
is accurate, complete, reliable, and is in its original form?
• EICAR test
• Confidentiality
• Power-on self-test
• Authenticity
• Integration test
• Availability
• Black box test
• Integrity

2. Which of the following terms refers to processed data? 7. Amy, a school-going girl was researching the White House for a school project.
• Phished Whenever she tried visiting the White House website, she ended up landing at the
• Authentic same pornographic website. Concerned about the matter, she wrote an email to the
White House informing them that pornographic content was being displayed on the
• Information
site. In a reply to her email, White House officials assured her that they had
• Nonrepudiated
thoroughly checked the site and found no such content. When Amy tried to access the
site again, to her frustration she ended up at the same porn site.
3. Which of the following terms refers to the act of accessing someone’s
What could be the reason for Amy to repeatedly keep landing at the
information without his or her knowledge?
pornographic website?
• Phishing
• Spam
• Hacking
• Bluesnarfing
• Social engineering
• Insufficient transport layer protection
• Bluesnarfing
• Malicious redirection

4. Which of the following terms refers to a Windows security feature, which


prevents unauthorized users from accessing a computer? 8. Andrew, a senior associate at the XZ law firm, is reviewing sensitive documents on behalf of
a client for a high profile case. After working for several hours straight reviewing documents,
• Control panel
he takes a coffee break and heads out to the local coffee house. After ordering coffee,
• User Account Control
Andrew logs on to the coffee shop Wi-Fi. He begins working on the document repository
• Encrypting File System (EFS)
online. Once his work is finished, he pays his bill and leaves for home. The next day, the
• Task manager
Internet is flooded with trade secrets of his client, and obviously, Andrew is held responsible
for it as he was the only one who had access to the information. Andrew is perplexed as to
5. Which of the following terms refers to allowing a user to bypass the login how the data theft occurred, especially when he had security measures in place. What could
functionality by restarting the system, in Mac OS X?
have caused the data theft?
• App downloads
• Usage of public Wi-Fi
• Software updates
• Phishing
• Guest account
• Spam
• Automatic login
• Configuration problems

Copyright © by EC-COUNCIL Copyright © by EC-COUNCIL

All Rights Reserved. Reproduction is Strictly Prohibited. All Rights Reserved. Reproduction is Strictly Prohibited.
Secure Computer User (CSCUv2) Secure Computer User (CSCUv2)

PRE-ASSESSMENT QUESTIONS PRE-ASSESSMENT QUESTIONS

9. Which of the following terms refers to a list of friends, who can help users to login 13. Sharon received the following email from an unknown person:
into their Facebook account if they forget their password?
Dear Friend,
• Restricted list
• Profile settings I am a Senior Account Manager of XYZ Bank. My name is George Bitts. I was personal
• Trusted contacts account manager to the CEO of a reputed steel company in Europe. He and his family
• Tagging died in air crash, while visiting Canada, five years back. Since then, I have enquired
about his next kin, but my attempts are useless. Recently our bank decided that it
would keep the CEO’s $45 million if no kin is found.
10. Which of the following terms refers to a hacking technique, which employs the
process of creating a fake URL mimicking the legitimate one? Hence, I am requesting you to help me in getting this amount before the bank keeps
• Site flaws it. I wish to present you before the bank official as the CEO’s next kin, so that this huge
• Evil twin amount will be transferred to your account. Once the transfer is complete, the funds
• Phishing would be shared between us.
• URL spoofing
If you are interested in this deal, please respond immediately to this
11. Jason likes spending his free time on social networking sites, especially Facebook. email. Regards,
One day while he was on Facebook, he clicked a link whose title was “You’ll never George Bitts
believe what this six-year-old found in his Happy Meal”. Then he liked the Facebook
page that had shared the link. Later, when he logged into his profile again, he noticed Which type of email security threat is this?
that his Facebook Wall was cluttered with spam, and links from the page he had liked
• Nigerian scam
had been shared with his friends.
• Spam
Which Internet attack was Jason a victim of?
• Phishing
• Social engineering
• Spy-phishing
• Evil twin
• Likejacking
• Bluesnarfing 14. Rita’s phone was stolen from her when she was in the bus returning home from visiting her
sister. When she went to her service provider to block the SIM, the assistant there told her
about a sequence of numbers, which is located near the battery in a phone. The assistant
12. Jessica, an 18-year-old girl, regularly posts her selfies on Facebook. Recently proceeded to tell Rita that this number is used to identify a mobile device. It also can be
some strangers have been posting lewd comments on her photos. These
used to remotely disable or blacklist a stolen phone.
comments are upsetting Jessica and she wants them to stop.
Which number was the assistant talking about?
Which Facebook setting should Jessica enable to prevent strangers from viewing • International Mobile Subscriber Identity (IMSI)
her photos?
• International Mobile Station Equipment Identity (IMEI)
• Deactivate account
• Mobile Equipment Identifier (MEID)
• Restricted list
• Electronic Serial Numbers (ESNs)
• Where you're logged in feature
• Who can see my stuff feature

Copyright © by EC-COUNCIL Copyright © by EC-COUNCIL

All Rights Reserved. Reproduction is Strictly Prohibited. All Rights Reserved. Reproduction is Strictly Prohibited.
Secure Computer User (CSCUv2) Secure Computer User (CSCUv2)

PRE-ASSESSMENT QUESTIONS PRE-ASSESSMENT QUESTIONS

15. Cameroon always keeps his phone’s Bluetooth on and in discoverable mode despite 18. Christie is a DJ by profession. She regularly mixes new tracks and releases them
being warned about it. He gets a few pairing requests a day but he always accepts online on her channel. She is about to go on vacation to the Caribbean where she
them without verifying since most of the times it is his neighbors who want to share intends to find inspiration on the sunny beaches and come up with some new original
pictures with him. Mitch, one of Cameroon’s friends, owes him $500. Cameroon just music. She does not want to carry more than required memory storage sticks with
got a text from Mitch asking him for his account number so that he could transfer the her as she intends to move around a lot and fears that she may lose some of the
money online. Cam texted Mitch his account number and within a few minutes got a memory sticks, along with her music, in transit. Thus, she requested some additional
reply text from Mitch saying that he had transferred the amount. Cameroon checked space from her current cloud service provider so that she can upload her tracks on
his account but could not see the money from Mitch. When he called Mitch, he the cloud that will eliminate the need to carry extra memory sticks. Which particular
confirmed that he had transferred the money to account # 0012548785875 whereas advantage of a cloud service helped Christie out in her situation?
Cameroon’s account number was #002154789247. Mitch immediately came over and • Cost effective
showed Cameroon the text he had received from him, which said that the account • Portability
number was 0012548785875. • Flexibility
Which attack was Cameroon most probably a victim of in this scenario? • Reliability
• Man in the middle attack
• Backdoor hacking 19. Which type of cloud caters to a group of organizations who share the same interests?
• Phishing • Private cloud
• Bluesnarfing • Public cloud
• Community cloud
16. A five-year old finance company was looking for a cloud computing platform to test the • Hybrid cloud
efficiency of its data and recently developed applications. The company wanted its data and
applications to be accessible only by its employees due to security concerns. 20. John recently set up a wireless network at his home. To avoid eavesdropping on his
Which of the following type of cloud computing platforms would be a best choice personal communication, John implemented a secure method of data communication. He
for the finance company? used WPA2( Wi-Fi Protected Access 2) to secure his home network from intruders. Which
• Private cloud of the following methods of securing his network did John employ?
• Public cloud • Authentication
• Community cloud • Certification
• Hybrid cloud • Encryption
• Authorization
17. Claire is a fashion designer by profession. Recently some of her designs were stolen
along with her laptop and after a few days, some other designer came up with a
collection that was originally hers. To prevent this from happening again, she decided
to store all her designs on a cloud henceforth. She is looking for a cloud service which
would suit her needs. Which aspect of the cloud service’s terms and conditions should
she pay most attention to?
• Data location
• Data ownership
• Data migration
• Data permanency

Copyright © by EC-COUNCIL Copyright © by EC-COUNCIL

All Rights Reserved. Reproduction is Strictly Prohibited. All Rights Reserved. Reproduction is Strictly Prohibited.
Secure Computer User (CSCUv2) Secure Computer User (CSCUv2)

PRE-ASSESSMENT QUESTIONS PRE-ASSESSMENT QUESTIONS

21. Karen is a student who frequently visits the coffee house next to her dorm as it has 25. Ellen just received her new driver’s license and noticed that all her details on it were
free Wi-Fi. Karen always connects to the Wi-Fi named Cup2, but during her latest visit correct apart from her picture. The picture was that of a man whom she did not
she noticed two Wi-Fi signals with the same name. She did not pay too much attention know. She brought this to the notice of the DMV officials. Upon investigation, they
to it though and logged on to the first signal that showed up on her laptop. The realized that the computer was selecting the wrong pictures to add to the licenses of
following day Karen noticed that $2000 was transferred from her online bank account women applicants specifically. Ellen had to ultimately get her picture taken once
to an unknown account. She was certain that she did not make any such transfer and again to get a correct driving license.
had not revealed any of her bank details to anyone over the internet or otherwise. Which of the following best describes the above issue?
Which of the following threats to wireless networks could have been behind • Software failure
Karen’s situation? • Human error
• Evil twin • Hardware failure
• Configuration problem • Natural disaster
• Encryption problems
• Virus attack 26. Josh just finished his coffee at a coffee shop with his friends and booked a cab through
an app on his phone to go home. The app showed that his cab would arrive at his
22. What is the most secure encryption method for home wireless network? location in 10 minutes. To kill some time, he clicked a few pictures of him and his
• WEP friends and posted them online. Karen, one of his friends, checked his post and after a
• WPA bit of digging deeper within minutes she could determine exactly where Josh was at
• WPA2 that moment. Which feature helped Karen determine Josh’s location?
• WAP2 • Pinpointing
• Geotagging
23. Which prefix to a website name symbolizes that the site is using a secured connection? • Mapping
• https// • Streaming
• https://
• https:\\ 27. Jesus keeps logging into his Facebook account from multiple devices and it is getting
• https\\ difficult for him to keep track of all the devices he uses to log in. To keep his account
24. ABC Info Ltd. is installing new servers in its offices with larger hard drive capacities as secure and not allow any unauthorized logins, he configured his Facebook account
part of its digital infrastructure upgrade program. This meant that some of the settings in a way that he gets an email alert every time a new device is used to log
servers which were obsolete, but in good working condition, would be sold to into his account. Which setting did Jesus configure?
recover some of the costs. The company’s servers house a host of important • General settings
information about the company, which have to be protected at all times. Which • Privacy settings
activity should the company carry out in order to be sure that the data on the old • Security settings
server hard drives are do not pass on to its new owners? • Timeline settings
• Data maintenance
• Data encryption
• Data deletion
• Data destruction

Copyright © by EC-COUNCIL Copyright © by EC-COUNCIL

All Rights Reserved. Reproduction is Strictly Prohibited. All Rights Reserved. Reproduction is Strictly Prohibited.
Secure Computer User (CSCUv2) Secure Computer User (CSCUv2)

PRE-ASSESSMENT QUESTIONS PRE-ASSESSMENT QUESTIONS

28. Jacob works at a law firm and is working on a high-profile criminal case involving a 31. Rachel wants to set up a cloud service for her newly formed organization. She
prominent city politician. As he goes about his investigation, he keeps making notes would require virtual computers, networks, and storage space in her cloud service.
on his phone. He is worried that if his phone is stolen or lost, all the sensitive Which of the following cloud services suits her needs?
information can fall into the wrong hands and that could lead to a disaster. What can § Platform as a Service (Paas)
Jacob do to ensure that his data is safe even of his phone gets stolen? § Software as a Service (SaaS)
• Back up his data § Disaster Recovery as a Service (DRaaS)
• Insure his phone § Infrastructure as a Service (IaaS)
• Encrypt his phone
• Enable SIM PIN 32. Which of the following terms refers to selecting messages that contain certain strings
of text or other symbols, and either discard them, or send them to another email box
29. George was at the airport to catch a flight from London to Sydney. While waiting for his of the user’s choice?
boarding call his phone died and he was charging his phone at a public charging point. § Email filtering
This was his spare phone which he only used while travelling abroad and had no data § Preview feature
or important numbers in it. This is why he never bothered to put a passcode on the § Digital signature
phone. When the boarding announcement was made, he forgot his phone and § Hash function
proceeded to board. He realized his phone was missing as soon as he boarded, but
there was nothing that he could do at that point. Since there is a no phones policy on 33. Which of the following terms refers to interconnecting devices in a short span,
flights, he couldn’t even borrow someone’s phone to cancel his service. After several generally within a person’s reach?
hours when he landed at Sydney, he immediately called his service provider from a § Wireless Local Area Network (WLAN)
public phone, but by that time, his phone had been used by someone to make a bunch § Wireless Metropolitan Area Networks (WMAN)
of long-distance calls and had amassed a huge bill. What can George do so that § Wireless Wide Area Network (WWAN)
something like this does not happen in future again? § Wireless Personal Area Network (WPAN)
• Encrypt his phone
• Enable SIM PIN 34. Which element of security guarantees that the claimed source of data is the
• Insure his phone actual origin of data?
• Back up his phone § Authenticity
§ Confidentiality
30. Which of the following terms refers to an action taken in advance to protect the § Integrity
system against threats or danger? § Availability
Precaution
Availability 35. Which element of security guarantees that data is in its original form, is
Reaction reliable, complete, and has not been tampered with?
Maintenance § Authenticity
§ Confidentiality
§ Integrity
§ Availability

Copyright © by EC-COUNCIL Copyright © by EC-COUNCIL

All Rights Reserved. Reproduction is Strictly Prohibited. All Rights Reserved. Reproduction is Strictly Prohibited.
Secure Computer User (CSCUv2) Secure Computer User (CSCUv2)

PRE-ASSESSMENT QUESTIONS PRE-ASSESSMENT QUESTIONS

36. Which of the following terms refers to the process of comparing current state of a 40. Which of the following terms refers to a data backup procedure that records
stored file to a previously recorded state to determine if the files has been data changes that have occurred since the most recent full back up?
changed since the time it was last recorded? § Online backup
§ Scanning § Differential backup
§ Heuristics § Incremental backup
§ Inoculation § System image backup
§ Integrity checking
41. Which of the following terms refers to a spyware detection and combat software that
37. Which of the following terms refers to files that record users’ browsing history and is built into the Windows operating system?
are stored locally on their computers? § Windows Defender
§ Cookies § Windows Firewall
§ Extensions § Windows Updates
§ ActiveX § Task Manager
§ Java
42. Which of the following cloud architecture is set up and used for a single entity
38. Janine received an email, which looked like it was sent from her favorite social or organization?
networking site. The email requested her to click the link present in the mail to § Public cloud
confirm her login credentials, otherwise her account would be deactivated. Fearing § Private cloud
for the deactivation of her account, Janine clicked the link. The link took her to a web § Hybrid cloud
page that seemed to be a part of the social networking site. She entered her login § Community cloud
credentials and received a supposed confirmation regarding the details of her
account. A couple of days later she realized that her account had been hacked as 43. Which of the following types of encryption makes use of a public and a private key
some personal pictures of her were missing from the social networking site. Which for the encryption and decryption of a message?
cyber-attack was Janine a victim of? § Symmetric encryption
§ Nigerian scam § Hashing encryption
§ Identity theft § Asymmetric encryption
§ Clickjacking § Database encryption
§ URL spoofing
44. Which of the following options refers to a collection of recently accessed items, such as
39. Ron forgot his Facebook login credentials and got locked out of it. He contacted files, folders, or websites, organized by the program which was used to open them?
his friend, Jess, who helped Ron log into his Facebook account again. Which § BitLocker
Facebook feature did Ron use to gain access to his Facebook account again? § Encrypting File System
§ Trusted contacts § Task Manager
§ Restricted list § Jump Lists
§ Ads and friends
§ Login alerts

Copyright © by EC-COUNCIL Copyright © by EC-COUNCIL

All Rights Reserved. Reproduction is Strictly Prohibited. All Rights Reserved. Reproduction is Strictly Prohibited.
Secure Computer User (CSCUv2) Secure Computer User (CSCUv2)

PRE-ASSESSMENT QUESTIONS PRE-ASSESSMENT QUESTIONS

45. Which of the following Facebook feature allows users to disable their profile and 49. Which of the following methods is used to destroy data permanently?
remove their name and photo from most things they had shared on Facebook? § Deleting a file from the system and from the recycle bin
§ Limit the audience for shared posts § Overwriting the data multiple times until it becomes gibberish
§ Deactivate the account § Formatting a hard drive multiple times
§ Restricted list § Encrypting a file so that it is inaccessible
§ App settings
50. An organization recently moved all its intellectual property to a third-party cloud
46. Claire detected some suspicious activity in her Wi-Fi. When she called a service recently. After a few weeks of this, the cloud service provider decided to move its
agent from the Wi-Fi company to identify the issue, she was told that someone was data servers to a different country which was offering heavy tax breaks for cloud
piggybacking on her Wi-Fi. What is happening in this scenario? infrastructure companies. Even though this move would have no impact on the
§ Someone is blocking Claire’s Wi-Fi signal accessibility of data to its client, the client was not happy with it and was considering
§ Someone is using Claire’s Wi-Fi without her permission moving to another service provider. What issues would this relocation of servers
§ Someone was spoofing Claire’s Wi-Fi SSID to create a clone create for the client organization?
§ Someone changed Claire’s Wi-Fi password without her knowledge § Security issues
§ Privacy Issues
47. Which of the following terms refers to the practice of remotely storing data or § Limited accessibility issues
running applications on a network of internet servers? § Support issues
§ Cloud computing
§ Online data backup
§ Virtualization
§ Electronic vaulting

48. Gary works as a network admin at an organization that depends upon an intranet for
the transfer of information. From a past couple of days, Gary has been meeting with a
girl, Lucy, for lunch, who has been taking a keen interest in his work. Lucy seems
fascinated by what Gary does and asked if she could show her around the server room.
In hopes of impressing Lucy, he takes her back to his office. He was giving her a tour of
the server room when Lucy excused herself for a few minutes to go to the ladies’
room. She returned a few minutes later and said that she had got an urgent phone call
and she was needed at work, but promised to meet him the day after at lunch.
However, the next day Gary was asked to leave the organization as some critical
information had been stolen from the server room, and his access card had been used
to swipe in. Which form of attack was Gary a victim of?
§ Pretexting
§ Phishing
§ Social engineering
§ Baiting

Copyright © by EC-COUNCIL Copyright © by EC-COUNCIL

All Rights Reserved. Reproduction is Strictly Prohibited. All Rights Reserved. Reproduction is Strictly Prohibited.

Das könnte Ihnen auch gefallen