[go: up one dir, main page]

0% found this document useful (0 votes)
700 views3 pages

Cyber Security Awareness - Exam

The document contains 25 multiple choice questions about cyber security topics such as maintaining ATM card networks, data leakage threats, popular hacker conferences, TLS versions, and mobile banking transaction limits. Each question is followed by 4 answer options with one correct answer. The questions cover a range of cyber security issues including vulnerabilities, threats, hacking incidents, types of phishing, data protection principles, and security protocols.

Uploaded by

Rahul Patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
700 views3 pages

Cyber Security Awareness - Exam

The document contains 25 multiple choice questions about cyber security topics such as maintaining ATM card networks, data leakage threats, popular hacker conferences, TLS versions, and mobile banking transaction limits. Each question is followed by 4 answer options with one correct answer. The questions cover a range of cyber security issues including vulnerabilities, threats, hacking incidents, types of phishing, data protection principles, and security protocols.

Uploaded by

Rahul Patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

3/15/2021 Punjab & Sind Bank


1. Which of the following is maintaing ATM Card network in India
A. NCIIPC B. RBI
C. NPCI D. NACH
Your answer is: C. NPCI


2. Compromising confidential information comes under _________
A. Bug B. Threat
C. Vulnerability D. Attack
Your answer is: C. Vulnerability


3. Data leakage threats do not usually occur from which of the following?
A. Web and email B. Mobile data storage
C. USB drives and laptops D. Television
Your answer is: D. Television


4. In which year the first popular hacker conference took place?
A. 1994 B. 1995
C. 1993 D. 1992
Your answer is: A. 1994


5. The latest version of TLS is _____
A. version 1.1 B. version 1.2
C. version 2.1 D. version 1.3
Your answer is: B. version 1.2


6. Lack of access control policy is a _____________
A. Bug B. Threat
C. Vulnerability D. Attack
Your answer is: B. Threat


7. What is the Monthly Transaction Limit of Mobile Banking (limit in Lakhs)
A. 2 B. 2.5
C. 1.5 D. 2.1
Your answer is: A. 2


8. Who was the first individual who performed a major hacking in the year 1971?
A. Steve Wozniak B. Steve Jobs
C. Kevin Mitnick D. John Draper
Your answer is: C. Kevin Mitnick


9. ____________ or smishing is one of the simplest types of phishing where the target
victims may get a fake order detail with a cancellation link.
A. Algo-based phishing B. Domain Phishing
C. SMS phishing D. Spear phishing
Your answer is: D. Spear phishing


10. _____________ track the users online activities like search queries, history pages &
downloads, for selling purposes.
A. Ad-based spyware B. System Monitors
C. Spy-trojans D. Tracking cookies
Your answer is: D. Tracking cookies

dls.estv.in/result.php?t_id=289550 1/3
3/15/2021 Punjab & Sind Bank


11. ________________ important and precious file is a solution to prevent your files from
ransomware.
A. Deleting all B. Keeping backup of
C. Not saving D. Keeping in pen drive
Your answer is: D. Keeping in pen drive


12. Existence of weakness in a system or network is called _______
A. Threat B. Vulnerability
C. Exploit D. Attack
Your answer is: C. Exploit


13. Risk and vulnerabilities are the same things.
A. TRUE B. FALSE
C. INFORMATION IRRELEVANT D. None Of These
Your answer is: B. FALSE


14. According to the CIA Triad, which of the below-mentioned element is not considered in
the triad?
A. Confidentiality B. Integrity
C. Authenticity D. Availability
Your answer is: D. Availability


15. If youre working in your companys system/laptop and suddenly a pop-up window arise
asking you to update your security application, you must ignore it.
A. TRUE B. FALSE
C. INFORMATION IRRELEVANT D. None Of These
Your answer is: C. INFORMATION IRRELEVANT


16. ________________ are unnecessary software which infiltrates users system, spy on
users activities, stealing internet usage data & sensitive information of that user.
A. Shareware B. Spyware
C. Ransomware D. Freeware
Your answer is: B. Spyware


17. Every employee of the firm must need to have some basic knowledge of cyber-security
and types of hacking and how they are done.
A. TRUE B. FALSE
C. Data in sufficient D. None of these
Your answer is: A. TRUE


18. _______ of information means, only authorised users are capable of accessing the
information.
A. Confidentiality B. Non-repudiation
C. Integrity D. Availability
Your answer is: A. Confidentiality


19. which of the following principle is violated if computer system is not accessible ?
A. confidentiality B. availability
C. access control D. authentication
Your answer is: C. access control

dls.estv.in/result.php?t_id=289550 2/3
3/15/2021 Punjab & Sind Bank


20. What should be security feature in the desktop
A. System should be in Active Directory B. System should have latest Anti-Virus
C. System should not remember the login Ids and D. All of the Above
password of the users
Your answer is: D. All of the Above


21. The three steps of data loss prevention are , Identify+E35 Discover
and______________
A. Classify B. Clarify
C. Deletion D. Detection
Your answer is: B. Clarify


22. Which of the following is not a strong security protocol?
A. HTTPS B. SSL
C. SMTP D. SFTP
Your answer is: A. HTTPS


23. _____________ = voice + phishing.
A. Algo-based phishing B. Vishing
C. Domain Phishing D. Email-based phishing
Your answer is: A. Algo-based phishing


24. SSL primarily focuses on _______
A. integrity and authenticity B. integrity and non-repudiation
C. authenticity and privacy D. confidentiality and integrity
Your answer is: A. integrity and authenticity


25. A __________ is a program that protects websites against bots by generating and
grading tests that humans can pass but current computer programs cannot.
A. CAPTCHA B. HUMAN Intelligence Test
C. FIREWALL D. ANTI-VIRUS
Your answer is: A. CAPTCHA

dls.estv.in/result.php?t_id=289550 3/3

You might also like