Cyber Security and Privacy 1 To 8 PDF
Cyber Security and Privacy 1 To 8 PDF
Week 8 Quiz
(All questions carry 1 point each)
1. The Cost-Benefit Analysis (CBA) formula for risk management decisions is given by:
2. In a cost-benefit analysis, _________ is the expected percentage of loss that would occur from a
particular attack
3. A ______ is a network security device that monitors traffic to or from a network and decides whether
to allow or block specific traffic based on a defined set of security rules.
Ans: d. Firewall
Explanation: Firewall monitors and filters network traffic based on an organization's security policies.
4. What risk management approach aims to minimize the impact of losses resulting from an actual
incident, disaster, or attack by implementing thorough contingency plans and preparations?
5. The product of the asset’s value and the exposure factor is known as:
Ans: c.Bit Stream Cipher can operate as a Block CIpher but Block Cipher cannot operate as a Bit Stream
Cipher
Explanation : Block Cipher can operate as a Bit Stream CIpher but Bit Stream Cipher cannot operate as
a Block Cipher
Ans: d.Key management: securely distributing and safeguarding the shared key.
Explanation: In symmetric encryption, compromising the shared key compromises all communication.
Securely distributing and managing this key can be difficult, especially as the number of communicating
parties increases.
10.In risk management, which equation is used to calculate the expected loss per risk?
Ans: b.Annualized Loss Expectancy (ALE) = Single Loss Expectancy (SLE) × Annualized Rate of Occurrence
(ARO)
Explanation:The equation for calculating the expected loss per risk in risk management is expressed as
the Annualized Loss Expectancy (ALE) equals the Single Loss Expectancy (SLE) multiplied by the
Annualized Rate of Occurrence (ARO).
Cyber Security and Privacy, IIT Madras
Prof. Saji K Mathew
Week 7 Quiz
(All questions carry 1 point each)
a. Registration authority
b. Public key infrastructure
c. Digital signature
d. Certificate authority
2. Which ring does the kernel, the core of the operating system, typically operate?
a.Ring 2
b.Ring 1
c.Ring 0
d.Ring 3
Ans: c.Ring 0
Explanation: The kernel requires the highest level of privilege to manage hardware and system
resources directly. Therefore, it usually operates in Ring 0, the innermost and most privileged ring.
6. Which of the following statements about Virtual Private Networks (VPN) are true?
7. Endpoint Detection and Response (EDR) solutions are primarily focused on:
a.Securing network perimeters and firewalls.
b.Protecting individual user devices from threats.
c.Monitoring and analyzing network traffic for malicious activity.
d.Providing vulnerability assessments for servers and applications.
8.Cryptojacking is a cyber attack that leverages a victim's computer resources for the attacker's financial
gain. Which of the following best describes the attacker's activity in a cryptojacking attack?
a.Encrypting the victim's data and demanding a ransom payment.
b.Gaining unauthorized access to the victim's personal information for resale.
c.Silently using the victim's processing power to solve complex mathematical problems for financial
reward.
d.Disrupting the normal operation of the victim's system to cause inconvenience.
Ans: c.Silently using the victim's processing power to solve complex mathematical problems for
financial reward.
Explanation : Cryptojacking involves secretly using the victim's computer's processing power (CPU or
GPU) to solve complex mathematical problems associated with cryptocurrency mining. These
computations generate cryptocurrency for the attacker, providing them with financial gain without
the victim's knowledge or consent.
9. What kind of infrastructure Advanced Persistent Threat (APT) groups are typically known for
targeting?
a.Personal computers of home users.
b.Critical infrastructure essential for national security (e.g., power grids, communication networks).
c.Public Wi-Fi networks at cafes or airports.
d.Outdated operating systems on personal devices of insignificant value
Ans: b.Critical infrastructure essential for national security (e.g., power grids, communication
networks).
Explanation : APT groups typically target high-value targets with significant impact, not personal
devices or public Wi-Fi.
10. Which of the following is NOT one of the stages in the Intrusion Kill Chain framework?
a.Reconnaissance
b.Exploitation
c.Cleanup
d.Command and Control
Ans: c.Cleanup
Explanation : The stages of the Intrusion Kill Chain typically include Reconnaissance, Weaponization,
Delivery, Exploitation, Installation, Command and Control, and Actions on Objectives. "Cleanup" is not
one of the recognized stages.
Cyber Security and Privacy, IIT Madras
Prof. Saji K Mathew
Week 6 Quiz
(All questions carry 1 point each)
1. A determination of the extent to which an organization’s information assets are exposed to risk is
known as:
a. Risk identification
b. Risk control
c. Risk assessment
d. Risk Management
2. _______is the risk to information assets that remains even after current controls have been applied.
a. Risk appetite
b. Residual risk
c. Inherent risk
d. Contingency risk
4. The likelihood of an attack together with the attack frequency to determine the expected number of
losses within a specified time range is known as:
a. Loss frequency
b. Attack success probability
c. Loss magnitude
d. Risk
Ans: a. Loss frequency
Explanation: Loss frequency is the probability that an organization will be the target of an attack,
multiplied by the probability that the organization’s information assets will be successfully
compromised if attacked.
5. _______is an information attack that involves searching through a target organization’s trash for
sensitive information.
a. Shoulder surfing
b. Network sniffing
c. Dumpster diving
d. Watering hole attacks
6 . Risk management in cyber security involves three key steps. These steps are:
7 . The "attack surface" in cyber security is a visualization tool that helps to understand:
Ans: b. The relationship between various types of threats and the organization's assets.
Explanation: The attack surface visualizes the potential threats on the Y-axis and the organization's
assets on the X-axis. This helps identify points of vulnerability and prioritize risk reduction efforts.
8. During the Risk Identification phase, assets are classified into which of the following categories?
Ans: d. People, Procedures, Data and information, Software, Hardware, and Networking elements
Explanation: Risk Identification begins with self-examination and Identification of info assets (6
categories) including people, procedures, data and information, software, hardware and networking
elements.
9. Which formula accurately represents the calculation of risk in cyber security risk assessment?
10. You are a security analyst for a company that manages an online store with a customer database.
Industry reports indicate a 10 percent chance of an attack this year, based on an estimate of one attack
every 10 years. A successful attack could result in the theft of customer data. There is a 20% chance of the
threat being able to materialize and achieve its objectives even in place of robust secure protection
mechanisms. The customer database is most valued being an e-commerce company at 90 in a 1-100 scale.
The IT department informed that 60% of the assets will be exposed after a successful attack. The
estimation of measurements is 80% accurate. Calculate the risk associated to the asset with a potential
SQL injection attack.
a. 3.756
b. 4.196
c. 3.276
d. 1.296
Ans: d. 1.296
Explanation:
RISK is the Probability of a Successful Attack on the Organization (Loss Frequency = Likelihood ∗ Attack
Success Probability) Multiplied by the Expected Loss from a Successful Attack (Loss Magnitude = Asset
Value ∗ Probable Loss) Plus The Uncertainty of estimates of all stated values
Week 5 Quiz
(All questions carry 1 point each)
2 . Which type of policy is related to an organization's strategic purpose, mission, and vision?
3 . True or False: Standards are broad, abstract documents that provide detailed procedures for
employees to comply with policies.
a.True
b.False
Ans: b.False
Explanation: Standards are more detailed statements of what must be done to comply with policy
practices, while procedures and guidelines explain how employees will comply with policy.
4. Which of the following reflects the hierarchical top-down order of information security policies?
a.Enterprise > Issue-Specific > Systems-Specific
b.Systems-Specific > Issue-Specific > Enterprise
c.Issue-Specific > Enterprise > Systems-Specific
d.All three policy types are independent and unconnected.
5. Which of the following components is typically included in the Enterprise Information Security Policy
(EISP)?
a. Incident response procedures
b. Statement of purpose
c. Software development guidelines
d. Employee performance evaluations
6. True or False: Systems-specific security policies (SysSPs) can be separated into two general groups,
managerial guidance SysSPs and technical specifications SysSPs.
a. True
b. False
Ans: a. True
Explanation: SysSPs can be separated into managerial guidance SysSPs and technical specifications
SysSPs, or they can be combined into a single policy document that contains elements of both.
7. ___________ consists of details about user access and use permissions and privileges for an
organizational asset or resource.
a. Access Control Lists
b. Configuration rules
c. Authorized access and usage of equipment
d. Authorization rules
8. True or False: Consequence-driven Cyber-informed Engineering (CCE) is a cyber defense concept that
focuses on the lowest consequence events from an engineering perspective so that resource-
constrained organizations receive the greatest return on their security investments.
a. True
b. False
Ans: b. False
Explanation: CCE focuses on the highest consequence events from an engineering perspective so that
resource-constrained organizations receive the greatest return on their security investments.
9. _________ are nonmandatory recommendations the employee may use as a reference in complying
with a policy.
a. Practices
b. Procedures
c. Standards
d. Guidelines
Ans: d. Guidelines
Explanation: Guidelines are recommendations for compliance.
10. Creating "air gaps" to isolate critical systems is a cyber hygiene practice that focuses on:
a. Installing the latest security patches.
b. Strengthening user authentication.
c. Segmenting networks for improved security
d. Keeping complex passwords up-to-date.
Week 4 Quiz
(All questions carry 1 point each)
1. A facility that provides only rudimentary services, with no computer hardware or peripherals is known
as:
a. Cold site
b. Hot site
c. Warm site
d. Service bureau
Explanation: A cold site is a backup facility that has the necessary electrical and physical components of
a computer facility, but does not have the computer equipment in place.
2. The amount of effort necessary to make the business function operational after the technology element
is recovered is known as:
Explanation: The Work Recovery Time (WRT) is the remainder of the Maximum Tolerable Downtime
(MTD) used to restore all business operations.
Explanation: Contingency Planning includes incident response planning (IRP), disaster recovery
planning (DRP), and business continuity planning (BCP), in preparation for adverse events that become
incidents or disasters.
4. An investigation and assessment of the various adverse events that can affect the organization,
conducted as a preliminary phase of the contingency planning process, which includes a determination of
how critical a system or set of information is to the organization’s core processes and recovery priorities
is known as:
a. Risk assessment
b. Business impact analysis
c. Crisis management
d. Incident damage assessment
Explanation: BIA helps determine which business functions and information systems are the most
critical to the success of the organization.
5. The process that prepares an organization to reestablish or relocate critical business operations during
a disaster that affects operations at the primary site is known as:
a. Business continuity planning
b. Disaster recovery planning
c. Strategic Planning
d. Operational planning
6. Which level of Organizational Planning typically addresses day-to-day activities and tasks?
a. Strategic Planning
b. Tactical Planning
c. Operational Planning
d. Top Management Planning
Explanation: Operational Planning, the bottom level of Organizational Planning, typically addresses
day-to-day activities and operational tasks within the organization.
a. Creating a strategic information security plan with a vision for the future of information security.
b. Understanding fundamental business activities performed by the company and suggesting appropriate
information security solutions that uniquely protect these activities.
c. Improving the status of information security by developing action plans, schedules, budgets, status
reports and top management communications
d. All the above
a. Business Assets
b. Risk Assets
c. Business Processes
d. Risk Factors
Explanation: Unit of Analysis in Contingency Planning Approach is Business Processes whereas its
Assets in Risk Management Approach
10. What is the purpose of conducting an After Action Review (AAR) in incident response?
Explanation: AAR is conducted to assess the effectiveness of the Incident Response Plan (IRP) by
examining actions taken during the incident, identifying areas for improvement, and refining response
procedures for future incidents.
Cyber Security and Privacy, IIT Madras
Prof. Saji K Mathew
Week 3 Quiz
(All questions carry 1 point each)
1. The process of defining and specifying the long-term direction to be taken by an organization, and the
allocation and acquisition of resources needed to pursue this effort is known as:
a. Governance
b. Security Management
c. Strategic Planning
d. Objectives
Explanation: Strategic planning sets the long-term direction to be taken by the organization and each
of its component parts to guide organizational efforts and focus resources toward specific, clearly
defined goals.
2. Which of the following statements best describes the relationship between GRC (Governance, Risk,
and Compliance) and cybersecurity ?
a. GRC focuses solely on cybersecurity management and overlooks other risk management
initiatives.
b. Cybersecurity is the primary focus of GRC, with minimal consideration for other risks.
c. GRC integrates cybersecurity as one component within the broader framework of enterprise
risk management (ERM).
d. GRC is a standalone framework independent of cybersecurity and risk management.
Ans: c. GRC integrates cybersecurity as one component within the broader framework of enterprise
risk management (ERM).
Explanation: GRC acknowledges cybersecurity as an essential aspect of risk management but places it
within the broader context of enterprise risk management (ERM). This approach ensures that
cybersecurity initiatives are aligned with overall organizational goals and risk management strategies,
encompassing various risks beyond just cyber-related ones
3. A written document provided by management that inform employees and others in the workplace
about proper behavior regarding the use of information and information assets are known as:
a. Guidelines
b. Information Security Policy
c. De facto standard
d. Practices
Ans: b. Information Security Policy
Explanation: An information security policy provides rules for the protection of the organization’s
information assets.
4. Which approach to cybersecurity management treats cybersecurity as a separate category distinct from
other risks an organization may face, and focuses solely on cybersecurity, depending on the size and
nature of the organization?
Explanation: By implementing GRC programs, the entire organization aligns its policies, decisions, and
actions with organizational objectives.
Explanation: The COSO ERM Framework aims to help organizations understand and prioritize risks and
create a strong link between risk, strategy and how a business performs.
8 . Which characteristic distinguishes the approaches of COBIT, COSO, and COSO-ERM from specific
standards like ISO or NIST?
Ans: c. They operate at the enterprise level rather than focusing on specific standards.
Explanation: COBIT, COSO, and COSO-ERM operate at the enterprise level, encompassing various
aspects of governance, risk, and compliance, unlike specific standards like ISO or NIST, which focus on
cybersecurity at a more granular level.
9. Why might some countries be hesitant to adopt the ISO 27001 model?
Ans: c. There are concerns about the model's overall effectiveness compared to existing approaches.
Explanation: Critics posit that there is no reason to believe the model is more useful than any other
approach and it is not as complete as other frameworks.
10. Which of the following is not considered a principle or practice for securing IT systems?
Week 2 Quiz
(All questions carry 1 point each)
Explanation: The industry standard for computer security since the development of the
mainframe. The standard is based on three characteristics that describe the utility of
information: confidentiality, integrity, and availability.
Ans: b. Policy
Explanation: The intersection of all 3 forms the central region from which “policy”,
primarily emerging from the management perspective, guides the security related
decisions and practice.
Ans: b.Identification
4. Should all 27 cells of McCumber’s Cube be addressed with the same priority?
a. True
b. False
Ans: b.False
Explanation: Although addressing each cell can provide a more comprehensive approach
to security, The Security Model does not mandate that all 27 cells must be individually
addressed. Organizations can prioritize their security efforts based on their specific
requirements, resources and risks.
5. Which of the following is/ are the design principles of high availability systems?
a. Eliminate single points of failure
b. Ensure reliable crossover
c. Identify failures in real time
d. All the above
Explanation: The mentioned design principles help to maintain the availability of systems
and services at all times.
6. In ensuring confidentiality, what is the crucial process that involves classifying information and
individuals, and mapping them based on the level of access?
a. Identification
b. Authentication
c. Authorization
d. Encryption
Ans: c. Authorization
Explanation: In ensuring confidentiality, the crucial process involves classifying both
information and individuals, and then mapping them based on the level of access they
require.
Ans: b. Accountability
Explanation: Information Security entails all the 3 components such as Network Security,
Computer & Data Security, Management of Information Security from whose intersection
Policy emerges.
10. Which are the three types of power McCumber’s Cube identifies?
e. Technologies
f. Policies and Practices
g. People
h. All the above
Week 1 Quiz
(All questions carry 1 point each)
1. A malicious email attack targeting a specific user or group of users, appearing to originate from a
trusted source is:
a. Spear Phishing
b. Man in the Middle Attack
c. Smurf Attack
d. Social media phishing
Explanation: Spear phishing attacks target specific users. It is similar to phishing, but attackers
customize their approach for specific individuals or organizations.
2. A malicious attack where hackers encrypt an organization’s data and demand payment to restore access
is known as:
a. Spyware
b. Ransomware
c. Whaling
d. Watering hole attack
Ans: b. Ransomware
Explanation: Ransomware denies access to a computer system or data until a ransom is paid.
3. Which of the following characteristics are most likely to be found in a phishing email?
Explanation: The above mentioned are some of the characteristics which make phishing emails more
recognizable.
a. Product
b. Technology
c. Process
d. Product, Technology and Process
Ans: c. Process
Explanation: Information security, often referred to as InfoSec, refers to the processes and tools
designed and deployed to protect sensitive business information from modification, disruption,
destruction, and inspection.
5. The practice of keeping an organization's network infrastructure secure from unauthorized access is
known as:
a. Data Security
b. Network Security
c. Information Security
d. Operations Security
Explanation: Network security is the field of cybersecurity focused on protecting computer networks
from cyber threats.
6. Which of the following statements most accurately reflects the complex role of technology in
cybersecurity?
Ans: c. Technology plays a triple role: source of threats, asset to protect, and defense weapon
Explanation: In the realm of cybersecurity, it is essential to have a clear understanding of the specific
meaning of the term "technology" when it is being utilized.
7. _______ is a manipulation technique that exploits human weakness to gain private information, access,
or valuables
a. Spyware
b. Logic Bomb
c. Social Engineering
d. Man in the Middle Attack
Explanation: Social engineering technique gathers information by exploiting the weakest part of
security, people.
8. True or False: The word "Cyber" in "Cybernetics" originates from the French language.
a. True
b. False
Ans: False
Explanation: Its of Greek origin derived from "κυβερνήτης" meaning steerman or pilot
a. Financial Loss
b. Reputation Damage
c. Regulatory fine
d. All the above
Explanation: A cyber incident can have short-term as well as long-term impacts on a business, such as
financial loss, reputation damage, loss of competitive advantage, reduction in credit rating, and increase
in cyber insurance premiums.
10. True or False: A Vendor guarantees that their IoT solutions are 100% safe from cyberattacks. This
statement can be
a. True
b. False
Ans: b. False
Explanation: Even robust systems are not truly 100% secure. Regardless of vendor claims, any
connected device or software faces potential vulnerabilities that could be exploited by attackers with
enough time, resources, and skill.