Sail E0 Webinar

MCQs

Total Questions : 25 | Page 1 of 3 pages
Question 1. In what year does creeper was changed to reaper?
  1.    1960s
  2.    1970s
  3.    1990s
  4.    2010s
 Discuss Question
Answer: Option B. -> 1970s
Question 2. Which of the following search queries will allow you to search the Internet for hardware-specific keyloggers with the best result?
  1.    keylogger -hardware
  2.    Site:hardware keylogger
  3.    keylogger +hardware
  4.    keylogger -software +hardware
 Discuss Question
Answer: Option D. -> keylogger -software +hardware
Question 3. What does 'integrity of data' mean?
  1.    "Accuracy and completeness of the data"
  2.    "Data should be viewable at all times"
  3.    "Data should be access by only the right people"
  4.    "None of the above"
 Discuss Question
Answer: Option A. -> "Accuracy and completeness of the data"
Question 4. A ____ occurs when an antimalware program identifies a file as malware, but the file is a valid, nonmalicious file
  1.    false positive
  2.    false negative
  3.    true positive
  4.    true negative
 Discuss Question
Answer: Option A. -> false positive
Question 5. Which best describes the results of the following search-engine query:World cup soccer -England
  1.    Search results show only world-cup soccer links to the England team
  2.    Search results show world-cup soccer prioritizing links for the England team
  3.    Search results show world-cup soccer omitting references to the England team
  4.    Search results show world-cup soccer deprioritizing links to the England
 Discuss Question
Answer: Option C. -> Search results show world-cup soccer omitting references to the England team
Question 6. Type of malware that inserts snippets of code inside Microsoft Office type files
  1.    Logic Bomb
  2.    Worm
  3.    Rootkit
  4.    Macro virus
 Discuss Question
Answer: Option D. -> Macro virus
Question 7. Which of the following is true aboutphishing?
  1.    Phishing is an act of catching fish for dinner.
  2.    Phishing is an attemptto acquire sensitive information such as passwords for malicious reasons.
  3.    Phishing is forgetting your password andcontacting IT to reset.
  4.    Phishing is a virus that will not allow you tolog onto your computer.
 Discuss Question
Answer: Option B. -> Phishing is an attemptto acquire sensitive information such as passwords for malicious reasons.
Question 8. What is one way that you can preventidentity theft?
  1.    Maxing out your credit card
  2.    Throwing personal documents away withoutshredding them
  3.    Opening several accounts
  4.    Examining bank accountson a regular basis
 Discuss Question
Answer: Option D. -> Examining bank accountson a regular basis
Question 9. Which security principles are covered by the CIA triad?
  1.    certified, integrated, accessible
  2.    continuity, integrity, accessibility
  3.    confidentiality, integrity, availability
  4.    confidentiality, installation, assembly
 Discuss Question
Answer: Option C. -> confidentiality, integrity, availability
Question 10. Which is an example of PII? (Personally Identifiable Information)
  1.    Credit Card Number
  2.    Name
  3.    Home Address
  4.    All of the above
 Discuss Question
Answer: Option D. -> All of the above

Latest Videos

Latest Test Papers