AKTU ICT Academy Computer System Security 1st Week Quiz Solutions
AKTU ICT Academy Computer System Security 1st Week Quiz Solutions
Hey guys here are the solutions of AKTU ICT Academy CSS quiz solutions for the first week. AKTU released noncredit courses for 2nd-year computer science students of B. Tech. The course code is KNC 401/KNC 402.
These answers are for all those who have confusion in the questions or they don’t want to submit wrong answers. Please attempt the quiz yourself before proceeding for the answers.
Disclaimer :- I don't claim for the 100% accuracy of the answers. I tried my level best to present the correct answers and I'm not responsible if any of the answer is incorrect.
1. What was the percentage increase in Zero Day Vulnerabilities in the year 2015?
a.) 4%
b.) 50%
c.) 100%
d.) 125%
Ans:- d.) 125%
-----------------------------------
2. What hacking attacks were mentioned in the lesson?
a.) Hacking in French Election
b.) ATM Hacking in India
c.) Denial of Service attack in Turkish Bank
d.) All of the above
Ans:- d.) All of the above
-----------------------------------
3. Identify the software whose vulnerability is exploited the most?
a.) Android
b.) Browser
c.) Adobe Flash Player
d.) Microsoft Office
Ans:- b.) Browser
-----------------------------------
4. The computer vulnerabilities and exploits databases are maintained by _________.
a.) Kaspersky Lab
b.) Symantec Corporation
c.) MITRE Corporation
d.) None of the above
Ans:- c.) MITRE Corporation
-----------------------------------
5. Which of the following is/are correct with respect to Ransomware?
a.) It is a form of Malware
b.) It encrypts the whole hard drive of the computer, essentially locking the user out of the entire system.
c.) It locks the system's screen or locks the users' files unless a ransom is paid.
d.) All of the above
Ans:- d.) All of the above
-----------------------------------
6. Which of the following is considered legal?
a.) Hacking a social media account and sending a private message
b.) Hacking a bank account and siphoning funds
c.) Hacking a company’s security system with permission from the management
d.) All of the above
Ans:- c.) Hacking a company’s security system with permission from the management
-----------------------------------
7. What is the cost of launching Denial of Service attack on a website?
a.) $20/hr
b.) $100/day
c.) $300/mont
d.) Both A and B
Ans:- d.) Both A and B
-----------------------------------
8. Which of the following is not an advantage of studying Cyber Security?
a.) It gives you the ability to hack a computer system
b.) It allows you to know the ways through which cyberspace can be breached
c.) Both A and B
d.) None of the above
Ans:- d.) None of the above
-----------------------------------
9. Which of the following is correct for silent banker?
a.) It is a trojan horse
b.) It records keystrokes, captures screens and steals confidential banking credentials and sends them to a remote attacker
c.) Both A and B
d.) None of the above
Ans:- c.) Both A and B
-----------------------------------
10. Which of the following is not a part of Security System Centric Design?
a.) Policy
b.) Agreement
c.) Mechanisms
d.) Threat Models
Ans:- b.) Agreement
-----------------------------------
11. Which of the following is not a goal in the security system design?
a.) Vulnerability
b.) Confidentiality
c.) Integrity
d.) Availability
Ans:- a.) Vulnerability
-----------------------------------
12. Which of the following is most important in design of secure system?
a.) Assessing vulnerability
b.) Changing or Updating System according to vulnerability
c.) Both A and B
d.) None of the above
Ans:- c.) Both A and B
-----------------------------------
13. Which of the following is correct with respect to Penetration testing?
a.) It is an internal inspection of Applications and Operating systems for security flaws.
b.) It is an authorized simulated cyber-attack on a computer system, performed to evaluate the security of the system
d.) It is hacking a security system of an organization.
d.) All of the above
Ans:- d.) All of the above
-----------------------------------
14. Which of the following is to be done to avoid limitations in threat models?
a.) Making more explicit and formalized threat models to understand possible weaknesses
b.) Making simpler and more general threat models
c.) Making less assumptions to design a better threat model
d.) All of the above
Ans:- d.) All of the above
-----------------------------------
SHARE
If you find this useful, please share with your friends and Community.
CODE TOGETHER..GROW TOGETHER.
CODE TOGETHER..GROW TOGETHER.
Newer Posts
Newer Posts
Older Posts
Older Posts
Comments