Cyber Security Awareness - Exam
Cyber Security Awareness - Exam
1. Which of the following is maintaing ATM Card network in India
A. NCIIPC B. RBI
C. NPCI D. NACH
Your answer is: C. NPCI
2. Compromising confidential information comes under _________
A. Bug B. Threat
C. Vulnerability D. Attack
Your answer is: C. Vulnerability
3. Data leakage threats do not usually occur from which of the following?
A. Web and email B. Mobile data storage
C. USB drives and laptops D. Television
Your answer is: D. Television
4. In which year the first popular hacker conference took place?
A. 1994 B. 1995
C. 1993 D. 1992
Your answer is: A. 1994
5. The latest version of TLS is _____
A. version 1.1 B. version 1.2
C. version 2.1 D. version 1.3
Your answer is: B. version 1.2
6. Lack of access control policy is a _____________
A. Bug B. Threat
C. Vulnerability D. Attack
Your answer is: B. Threat
7. What is the Monthly Transaction Limit of Mobile Banking (limit in Lakhs)
A. 2 B. 2.5
C. 1.5 D. 2.1
Your answer is: A. 2
8. Who was the first individual who performed a major hacking in the year 1971?
A. Steve Wozniak B. Steve Jobs
C. Kevin Mitnick D. John Draper
Your answer is: C. Kevin Mitnick
9. ____________ or smishing is one of the simplest types of phishing where the target
victims may get a fake order detail with a cancellation link.
A. Algo-based phishing B. Domain Phishing
C. SMS phishing D. Spear phishing
Your answer is: D. Spear phishing
10. _____________ track the users online activities like search queries, history pages &
downloads, for selling purposes.
A. Ad-based spyware B. System Monitors
C. Spy-trojans D. Tracking cookies
Your answer is: D. Tracking cookies
dls.estv.in/result.php?t_id=289550 1/3
3/15/2021 Punjab & Sind Bank
11. ________________ important and precious file is a solution to prevent your files from
ransomware.
A. Deleting all B. Keeping backup of
C. Not saving D. Keeping in pen drive
Your answer is: D. Keeping in pen drive
12. Existence of weakness in a system or network is called _______
A. Threat B. Vulnerability
C. Exploit D. Attack
Your answer is: C. Exploit
13. Risk and vulnerabilities are the same things.
A. TRUE B. FALSE
C. INFORMATION IRRELEVANT D. None Of These
Your answer is: B. FALSE
14. According to the CIA Triad, which of the below-mentioned element is not considered in
the triad?
A. Confidentiality B. Integrity
C. Authenticity D. Availability
Your answer is: D. Availability
15. If youre working in your companys system/laptop and suddenly a pop-up window arise
asking you to update your security application, you must ignore it.
A. TRUE B. FALSE
C. INFORMATION IRRELEVANT D. None Of These
Your answer is: C. INFORMATION IRRELEVANT
16. ________________ are unnecessary software which infiltrates users system, spy on
users activities, stealing internet usage data & sensitive information of that user.
A. Shareware B. Spyware
C. Ransomware D. Freeware
Your answer is: B. Spyware
17. Every employee of the firm must need to have some basic knowledge of cyber-security
and types of hacking and how they are done.
A. TRUE B. FALSE
C. Data in sufficient D. None of these
Your answer is: A. TRUE
18. _______ of information means, only authorised users are capable of accessing the
information.
A. Confidentiality B. Non-repudiation
C. Integrity D. Availability
Your answer is: A. Confidentiality
19. which of the following principle is violated if computer system is not accessible ?
A. confidentiality B. availability
C. access control D. authentication
Your answer is: C. access control
dls.estv.in/result.php?t_id=289550 2/3
3/15/2021 Punjab & Sind Bank
20. What should be security feature in the desktop
A. System should be in Active Directory B. System should have latest Anti-Virus
C. System should not remember the login Ids and D. All of the Above
password of the users
Your answer is: D. All of the Above
21. The three steps of data loss prevention are , Identify+E35 Discover
and______________
A. Classify B. Clarify
C. Deletion D. Detection
Your answer is: B. Clarify
22. Which of the following is not a strong security protocol?
A. HTTPS B. SSL
C. SMTP D. SFTP
Your answer is: A. HTTPS
23. _____________ = voice + phishing.
A. Algo-based phishing B. Vishing
C. Domain Phishing D. Email-based phishing
Your answer is: A. Algo-based phishing
24. SSL primarily focuses on _______
A. integrity and authenticity B. integrity and non-repudiation
C. authenticity and privacy D. confidentiality and integrity
Your answer is: A. integrity and authenticity
25. A __________ is a program that protects websites against bots by generating and
grading tests that humans can pass but current computer programs cannot.
A. CAPTCHA B. HUMAN Intelligence Test
C. FIREWALL D. ANTI-VIRUS
Your answer is: A. CAPTCHA
dls.estv.in/result.php?t_id=289550 3/3