Examen Test
Examen Test
Examen Test
(EXAM TEST)
Exam CSCU By Christian N’GORAN
1- In this attack, a victim receives an e-mail claiming from PayPal stating that their account has
been disabled and confirmation is required before activation. The attackers then scam to
collect not one but two credit card numbers, ATM PIN number and other personal details.
Ignorant users usually Fall prey to this scam. Which of the following statement is incorrect related to
this attack?
a- Do not reply to email messages or popup ads asking for personal or financial information
b- Do not trust telephone numbers in e-mails or popup ads
c- Review credit card and bank account statements regularly
d- Antivirus, anti-spyware, and firewall software can very easily detect these type of attacks
e- Do not send credit card numbers, and personal or financial information via e-mail
2- Ross is going to an adventure camp with his friends. In the meantime, his cousins will be
staying at his house. Since Ross cousins are very mischievous, he does not want them using his
new windows laptop. What steps can be taken to prevent his cousins from accessing his
laptop.
a- Installing and maintaining an antivirus
b- Creating backup copies of the important data
Exam CSCU By Christian N’GORAN
3- Kati shares her laptop with her brother Gorges. Kati has some personal photos in her folder,
which she does not want Gorges to see. In what ways could Katie prevent Gorges from
accessing her folder?
a- Using Backup
b- Using encryption
c- Using strong password
d- Using firewall
4- gareth's parent found him watching porn online on the new Mac they gave him on his
birthday. the obviously do not want gareth to repeat this behavior. What action can gareth's
parent take to ensure this.
a- Parental control
b- Vault
c- Time machine
d- Icould
5- If a person suspects his or her computer is infected with malware, which indicators can
confirm that this is the case?
a- Pop ups
b- Scanning
c- Firewall
d- Suspicious behavior
6- Emma won a laptop at her college science fair. The laptop does not have antivirus software
installed on it. Emma has to purchase one. What factors should Emma keep in mind before
purchasing the software?
a- Doesn’t fully protection
b- Compability
c- Conflicts
d- Comprehensive protection
7- Gloria suspects that her laptop is infected with malware. Upon scanning the system using
antivirus software, no malware is detected. Despite this, her laptop continues to display
symptoms of malware infection. What may be the reason for this?
a- Antivirus does not detect malware
b- Ability to remove infections from computer system
c- Random network activity
d- Choose a two factors
8- Karen noticed that her son was not himself lately. He did not want to go to school or play with
his friends and had a perpetual morose look on his face. When karen questioned him about
this, he broke down and told her that some kids from his class made a facebook page just to
ridicule his appearance and make fun of him publicy. what can Karen do to prevent further
cyberbullying of her son
a- informe their parents if they are being cyberbullied
Exam CSCU By Christian N’GORAN
9- Harold just got home from working at Henderson LLC where he works as an IT technician. He
was able to get off early because they were not too busy. When he walks into his home office,
he notices his teenage daughter on the computer, apparently chatting with someone online.
As soon as she hears Harold enter the room, she closes all her windows and tries to act like
she was playing a game. When Harold asks her what she was doing, she acts very nervous and
does not give him a straight answer. Harold is very concerned because he does not want his
daughter to fall victim to online predators and the sort. Harold doesn't necessarily want to
install any programs that will restrict the sites his daughter goes to, because he doesn't want
to alert her to his trying to figure out what she is doing. Harold wants to use some kind of
program that will track her activities online, and send Harold an email of her activity once a
day so he can see what she has been up to. What kind of software could Harold use to
accomplish this?
a- Install hardware Keylogger on her computer
b- Install screen capturing Spyware on her computer
c- Enable Remote Desktop on her computer
d- Install VNC on her computer
10- Joan recently introduced her 10 year old daughter Kloe to the internet to help her in her
studies. Joan is a very cautious person and she does not want Kloe exposed to online threats.
What steps can Joan take to prevent this?
a- Play game
b- Evite social networking sites
c- restrict access to inappropriate websites using internet filtering software
d- Use kidzi
11- Monica, a 21 years old woman, regulary uploads selfies and statuses on facebook. Gina, who
considers Monica to be her social rival, regulary post sarcastic and rude comments on
Monica’s updates. In addition, some strangers have been posting vulgar comments on her
photo as well. What steps can Monica take to prevent Gina and these strangers from viewing
her facebook activity?
a- deactivate your account
b- who can contact me
c- who can see my posts
d- block users
12- Whats risks do people face on social networking sites if they are not careful about their online
activity?
a- Hijacking
b- Identify theft
c- Malwarebyte
d- Email spoofing
Exam CSCU By Christian N’GORAN
14- An attachment, with according to the email, is a childhood picture of them. How should r as
Richard make sure that the attachment is not malicious?
a- Scanning an attachment
b- Blocked sender
c- Turn off the preview feature
d- Use spamfighter
16- After a spate of email related threats and breaches at his him, Ryan has decided to improve
the security measure to secure his company network. What email security measures should
Ryan implement?
a- Use safari
b- use HTTPS enabled email service provider
c- blocked senders tab
d- check for last account activity
17- After reading a research paper on data loss, Anne saved her important data on her Iphone.
What application can back up its data on Iphone
a- App Store
b- Time machine
c- One drive
d- Vault
18- An attacker finds a web page for a target organization that supplies contact information for
the company. Using available details to make the message seem authentic, the attacker drafts
e-mail to an employee on the contact page that appears to come from an individual who
might reasonably request confidential information, such as a network administrator. The
email asks the employee to log into a bogus page that requests the employee's user name and
password or click on a link that will download spyware or other malicious programming.
Exam CSCU By Christian N’GORAN
Google’s Gmail was hacked using this technique and attackers stole source code and sensitive
data from Google servers. This is highly sophisticated attack using zero-day exploit vectors,
social engineering and malware websites that focused on targeted individuals working for the
company. What is this deadly attack called?
a- Spear phishing attack
b- Trojan server attack
c- Javelin attack
d- Social networking attack
19- The management of a firm decided to replace all the desktop computers in its offices with
laptops. The system administrator was instructed to sell the computers at a discounted rare to
recover some of the cost of the upgrade. What should the system administrator do before
selling of the computers?
a- Encrypt a data
b- Backup data
c- Install a firewall
d- Create an administrator account
20- Witch of the following option would you choose to secure e-mail message?
a- Digital photograph
b- Digital signature
c- Digital autograph
d- Digital voice
21- Recently, Claire’s laptop was infected with malware and she took it to the service center to be
formatted. What step’s can Claire take to prevent the same thing from happening again?
a- Use encryption
b- Use malwarebyte
c- Use backup
d- Use Norton
22- Phil noticed that this Wi-Fi data plan is getting exhausted earlier than usual for the past couple
of months. He suspects that someone else may be tagging on to his Wi-Fi signal and using up
the data. What can Phil do to secure his connection?
a- Use encryption WPA2
b- Use encryption WPA
c- Use encryption WEP
d- War driver
23- What are the risks a person should be aware of when using a smartphone?
a- Eavesdropping
b- Stenography
c- Grooming
d- Man in the middle
Exam CSCU By Christian N’GORAN
24- Ami works a as marketing executive for QW Agency. While coming home from work, Ami
misplaced her recently purchased iphone. The loss of Ami’s iphone worried her as it contained
the launch strategy of a new product, and Ami did not want it to fall into the wrong hands.
How should Amy proceed in order to prevent the data from falling into the wrong hands as
well as to recover her iphone?
a- Use Touch ID
b- Use find my Iphone
c- Use dropbox
d- Encrypt your phone
25- Bob has set up three web servers on Windows Server 2008 IIS 7.0. Bob has followed all the
recommendations for securing the operating system and IIS. These servers are going to run
numerous e-commerce websites that are projected to bring in thousands of dollars a day. Bob
is still concerned about the security of these servers because of the potential for financial loss.
Bob has asked his company's firewall administrator to set the firewall to inspect all incoming
traffic on ports 80 and 443 to ensure that no malicious data is getting into the network.
Why will this not be possible?
a- Firewalls cannot inspect traffic coming through port 443
b- Firewalls can only inspect outbound traffic
c- Firewalls cannot inspect traffic at all, they can only block or allow certain ports
d- Firewalls cannot inspect traffic coming through port 80
26- Harry, a wildlife photographer, is about to go to Africa for an assignment. In the past his
equipment has suffered damage in the wild resulting in him losing all his pictures. Thus Harry
decided to subscribe to a cloud service this time so that he can back up his pictures regularly
to keep them safe. What factors should Harry keep in mind before choosing a could service
provider?
a- Accessibility
b- Data migration
c- Data ownership
d- Community cloud
27- Jackie is writing a novel and she feels that her manuscript would be safer if it is stored on
could and not on local computer. After a bit research, she found out that even though could
has its advantages, it faces several threats. What threats should Jackie be aware of before
selecting a cloud service?
a- Shared space
b- Technologies loop holes
c- Hijacking
d- Spoofing
28- Max, a lawyer, has stored confidential data regarding his clients on could service. Of late,
there have been many reported cases of could accounts being hacked. Max wants to make
sure that his data is not stolen. What precautionary measures can Max take to protect his
data? (select 2 answer)
a- Choose two step authentication
b- Use antivirus
Exam CSCU By Christian N’GORAN
d- You create hashes of a large number of words and compare it with the encrypted
passwords
e- You wait until the password expires
38- Name the attack where a person is tricked into disclosing information
a- Time bomb
b- Backdoors
c- Keylogging
d- Social engineering
42- The restrict visiting internet sites, you can modify the settings of your
a- ISP
b- Modem
c- Operating system
Exam CSCU By Christian N’GORAN
d- Web browser
44- Marc connects to a site but it seems to him that this site is not secure. To be done it must
verify
a- http:// in the URL and handcuff sign on the page
b- https:// in the URL and handcuff sign on the page
c- https:// in the URL and padlock sign on the page
d- https:/ in the URL and padlock sign on the page
48- Witch of the following countermeasure can specifically protect against both the MAC Flood
and MAC spoofing attacks?
a- Configure Port Security on the switch
b- Configure Port Recon on the switch
c- Configure Switching Mapping
d- Configure Multiple Recognition on the switch
50- Within the context of Computer Security, which of the following statements describes Social
Engineering best?
a- Social Engineering is the act of publicly disclosing information
b- Social Engineering is the means put in place by human resource to perform time
accounting
c- Social Engineering is the act of getting needed information from a person rather than
breaking into a system
d- Social Engineering is a training program within sociology studies
Exam CSCU By Christian N’GORAN