Sie sind auf Seite 1von 6

1

2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
What is PUP?
 monitors user activity on internet and transmit that information in the background to someone else
Unsolicited commercial email is known as _
Internet can impose a number of Risks and hence Cybersecurity is required -
A ________ is like a Virus, having the ability to spread without any medium -
Which of these are Personally Identifiable Information?
Which of these is an anti-virus program
 The sole purpose of ________ attack, is to fool the victim and to get all the confidential information
If there is a vulnerability but no threat, then there won't be a risk
In Symmetric-key cryptography, the key used by the sender and the receiver is
Risk represents
Cryptography, a word with Greek origins, means
The Cryptography can provide
Detection and Analysis is a continuous process of a cyber-attack for detecting Malware intrusion and their remote connections -
Which is a part of a response phase activities ?
UML component diagram is used to identify how a module validate &processes the data before storing it
Incident Category can be defined according to business functional priorities
Incidents should be handled on a first come- first serve basis and must be prioritized based on the Business impact
Which is not part of a Incident Response Preparation phase ?
Which is not a set of activity performed to prevent future incidents in Incident management ?
Deep packet inspection can be used to give more context to indicator only
A ________ is a credit card sized card with an embedded chip, containing information about the user
Which of these are Threats related to Email Security?
Phishing emails include fake notifications from banks and e-payment systems
Which of these are examples biometrics?
Which of these is TRUE with respect to passwords?
How do we define RADIUS?
As an email client, we should not use caution when opening emails and can download any attachments
At Operational level threat intelligence real time feed protocols are being used
Cyber security architecture is all about understanding one's Business Scope and requirements only
Which of the following is not an antivirus software?
Network layer firewall works as a
The Cryptography can provide
are attempts by individuals to obtain confidential information from you to falsifying their identity
Attack which happens due to neglected factors like compromising with security is a type of
Which helps to determine the effective security controls and measurement techniques
A Hacker or disgruntled employee who is interested in specific Asset or information is a type of
A TCS business operations team required to meet 98% SLA in FY 2017'18 to avoid non-compliance penalty which must be a part of
Defining the security control parameter SLA at 98.5% for taking appropriate actions to avoid penalty risk if it goes below 98% must
At Strategic level threat intelligence information can be exchanged within it's operating community
The altering of data so that it is not usable unless the changes are undone is
It is a program or hardware device that filters the information coming through an internet connection to a network or computer syst
An attempt to make a computer resource unavailable to its intended users is called
At Tactical level threat intelligence research analysis and reports can be published after malware analysis
UEBA stands for
________ is the guarantee of data privacy and protection against unauthorized disclosure.
Which is aisopen
A ________ source data
an extension loss
of an preventionprivate
enterprise’s solution.
intranet across a public Network such as the Internet across a public Network suc
Internet, creating a secure private connection.
Which helps to predict the cybersecurity potential risks effectively ?
The relationship between a character in the plaintext to a character is
In asymmetric key cryptography, the private key is kept by
They Keys used in Cryptography are
Which of the following would most likely not be a symptom of a virus?
In symmetric-key cryptography, the same key is used by
which can't be used as a best practice for managing cyber threats ?
WPA2 is used for security in ________
In cryptography, what is cipher?
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is
Which is not a characteristics of Advanced Persistent threats ?
Traffic in a VPN is not
Denial-of-service attack
Potentially unwanted program
Spyware
Spam
True
Worm
all
all
Phishing
1
Shared
Threats times vulnerabilities
Secret Writing
all
1
Take appropriate pre-approved or required actions
false
true
0
Create appropriate control framework
Mitigate
0
Smart Card
all
1
all
Passwords need to be atleast 8 chars of length
Remote Authentication Dial-In User Service.
0
1
0
Code Red
Packet filter
all
Spyware scams - wrong
Non-Malicious threat
Threat Modelling
Malicious threat
Architecture Controls
Architecture Risks
TRUE
Encryption
firewall
Denial-of-service attack
false
User Entity and Behavior Analytics
Confidentiality
MyDLQ
VPN
Threat Mitigation
Many-to-one relationship
Sender and Receiver
Single Round
Existing program files and icons disappear
Both Party
Behavioral Modelling
Wifi
ALL
Long
Full automated
Logically

Das könnte Ihnen auch gefallen