{"id":708,"date":"2023-05-04T22:23:38","date_gmt":"2023-05-04T22:23:38","guid":{"rendered":"https:\/\/emorah.com\/story\/?p=708"},"modified":"2023-05-04T22:23:39","modified_gmt":"2023-05-04T22:23:39","slug":"cybersecurity-prologue-fresco-play-mcqs-answers","status":"publish","type":"post","link":"https:\/\/emorah.com\/story\/fresco-play\/cybersecurity-prologue-fresco-play-mcqs-answers\/","title":{"rendered":"Cybersecurity Prologue Fresco Play MCQs Answers"},"content":{"rendered":"\n<p>Cybersecurity Prologue Fresco Play MCQs Answers<\/p>\n\n\n\n<p><strong>Time to Evaluate Your Understanding!<\/strong><\/p>\n\n\n\n<p>1.Malware cannot inflict physical damage to systems.<\/p>\n\n\n\n<ol><li>True<\/li><li>False<\/li><\/ol>\n\n\n\n<p>Answer: 2)False<\/p>\n\n\n\n<p>2.The type of malware that restricts access to the computer either by encrypting files on the hard drive or by displaying messages demanding a ransom is called __________.<\/p>\n\n\n\n<ol><li>Trojans<\/li><li>Scareware<\/li><li>Ransomware<\/li><li>Spyware<\/li><\/ol>\n\n\n\n<p>Answer: 3)Ransomware<\/p>\n\n\n\n<p>3._________ is commonly known for providing backdoor access to the system for malicious users.<\/p>\n\n\n\n<ol><li>Rootkits<\/li><li>Botnets<\/li><li>Trojans<\/li><li>Worms<\/li><\/ol>\n\n\n\n<p>Answer: 3)Trojans<\/p>\n\n\n\n<p>4.The type of malware that tricks users by making them believe that their computer has been infected with a virus is called __________.<\/p>\n\n\n\n<ol><li>Ransomware<\/li><li>Spyware<\/li><li>Rootkits<\/li><li>Scareware<\/li><\/ol>\n\n\n\n<p>Answer: 4)Scareware<\/p>\n\n\n\n<p>5._________ is a standalone software that does not need human help\/host program to spread.<\/p>\n\n\n\n<ol><li>Ransomware<\/li><li>Trojan<\/li><li>Virus<\/li><li>Worm<\/li><\/ol>\n\n\n\n<p>Answer: 4)Worm<\/p>\n\n\n\n<p>6.An error message displayed on the system symbolizes virus infection.<\/p>\n\n\n\n<ol><li>False<\/li><li>True<\/li><\/ol>\n\n\n\n<p>Answer: 1)False<\/p>\n\n\n\n<p>7.Which of the following malware is designed for advertising, such as pop-up screens?<\/p>\n\n\n\n<ol><li>Adware<\/li><li>Viruses<\/li><li>Spyware<\/li><li>Ransomware<\/li><\/ol>\n\n\n\n<p>Answer: 1)Adware<\/p>\n\n\n\n<p>8.Which of the following is used to draw in users and infect them and deploy fast changing infrastructures?<\/p>\n\n\n\n<ol><li>Honeynet<\/li><li>Botnet<\/li><li>Trojans<\/li><li>Malnet<\/li><\/ol>\n\n\n\n<p>Answer: 1)Malnet<\/p>\n\n\n\n<p>9._________________ is a device infected by malware, which becomes part of a network of infected devices administered by a single attacker or attack group.<\/p>\n\n\n\n<ol><li>Bot<\/li><li>Honeynet<\/li><li>Rootkit<\/li><li>Honeypot<\/li><li>Time to Evaluate Your Understanding!<\/li><\/ol>\n\n\n\n<p>Answer: 1)Bot<\/p>\n\n\n\n<p>10.The common term for a software that is considered as nonessential, whose implementation can compromise privacy or weaken the computer&#8217;s security is called ___________.<\/p>\n\n\n\n<ol><li>Spam<\/li><li>Malware<\/li><li>Malicious Program<\/li><li>Potentially Unwanted Program<\/li><\/ol>\n\n\n\n<p>Answer: 4)Potentially Unwanted Program<\/p>\n\n\n\n<p>11.________ is designed to extract data from its host computer for marketing purposes.<\/p>\n\n\n\n<ol><li>Spyware<\/li><li>Trojans<\/li><li>Adware<\/li><li>Ransomware<\/li><\/ol>\n\n\n\n<p>Answer: 1)Spyware<\/p>\n\n\n\n<p>12.What is PUP?<\/p>\n\n\n\n<ol><li>Practially Unwanted Program<\/li><li>Potentially Unwanted Procss<\/li><li>Potentially Unwanted Program<\/li><li>Practically Unrelated Program<\/li><\/ol>\n\n\n\n<p>Answer: 3)Potentially Unwanted Program<\/p>\n\n\n\n<p>13.The method of protecting programs, networks, and systems from digital attacks is commonly known as __________.<\/p>\n\n\n\n<ol><li>Cryptography<\/li><li>Cryptanalysis<\/li><li>Cryptology<\/li><li>Cybersecurity<\/li><\/ol>\n\n\n\n<p>Answer: 4)Cybersecurity<\/p>\n\n\n\n<p>14.Programs that are specifically designed to disrupt the performance of computers\/networks are commonly known as __________.<\/p>\n\n\n\n<ol><li>Ransomware<\/li><li>Trojans<\/li><li>Malware<\/li><li>Virus<\/li><\/ol>\n\n\n\n<p>Answer: 1)Ransomware<\/p>\n\n\n\n<p><strong>Time to Evaluate Your Understanding!<\/strong><\/p>\n\n\n\n<p>1.The security posture of an organization is defined by the ______ link in the chain.<\/p>\n\n\n\n<ol><li>Weakest<\/li><li>Strongest<\/li><li>Average<\/li><\/ol>\n\n\n\n<p>Answer: 1)Weakest<\/p>\n\n\n\n<p>2.Which of the following attributes is not a PII?<\/p>\n\n\n\n<ol><li>Date of Birth<\/li><li>Credit Card Information<\/li><li>IP Address<\/li><li>Account Numbers<\/li><li>Social Security Number<\/li><\/ol>\n\n\n\n<p>Answer: 3)IP Address<\/p>\n\n\n\n<p>3.The security attribute that aims to achieve data privacy and protection against unauthorized disclosure is called ____________.<\/p>\n\n\n\n<ol><li>Integrity<\/li><li>Authentication<\/li><li>Availability<\/li><li>Confidentiality<\/li><\/ol>\n\n\n\n<p>Answer: 4)Confidentiality<\/p>\n\n\n\n<p>4.As an application of cryptography, digital Signatures and MACs can be used for _____________.<\/p>\n\n\n\n<ol><li>Authentication<\/li><li>Confidentiality<\/li><li>Availability<\/li><li>Integrity<\/li><\/ol>\n\n\n\n<p>Answer: 1)Authentication<\/p>\n\n\n\n<p>5.Threats can exploit assets if assets are not vulnerable.<\/p>\n\n\n\n<ol><li>False<\/li><li>True<\/li><\/ol>\n\n\n\n<p>Answer: 1)False<\/p>\n\n\n\n<p>6.Which of the following is an attack against confidentiality?<\/p>\n\n\n\n<ol><li>Password Attack<\/li><li>DoS Attack<\/li><li>Cross Site Scripting Attack<\/li><li>Man in the Middle Attack<\/li><\/ol>\n\n\n\n<p>Answer: 4)Man in the Middle Attack<\/p>\n\n\n\n<p>7.Which of the following is an intangible asset?<\/p>\n\n\n\n<ol><li>Trade Secrets<\/li><li>Inventory and Machinery<\/li><li>Business Premises<\/li><li>Hardware components<\/li><\/ol>\n\n\n\n<p>Answer: 1)Trade Secrets<\/p>\n\n\n\n<p>8.If a student gains unauthorized access to the student database and modifies his\/her marks, what type of violation would it be?<\/p>\n\n\n\n<ol><li>Integrity<\/li><li>Both the options<\/li><li>Confidentiality<\/li><\/ol>\n\n\n\n<p>Answer: 2)Both the options<\/p>\n\n\n\n<p>9.Which of the following is an attack against availability?<\/p>\n\n\n\n<ol><li>Birthday Attack<\/li><li>DoS Attack<\/li><li>Man in the Middle Attack<\/li><li>Zero Day Attack<\/li><\/ol>\n\n\n\n<p>Answer: 2)DoS Attack<\/p>\n\n\n\n<p>10.Choose the correct option.<\/p>\n\n\n\n<ol><li>Risk=Threat\/Vulnerability<\/li><li>Risk=Threat*Vulnerability<\/li><li>Threat=Risk*Vulnerability<\/li><li>Vulnerability=Threat\/Risk<\/li><\/ol>\n\n\n\n<p>Answer: 3)Threat=Risk*Vulnerability<\/p>\n\n\n\n<p>11.The type of attack in which the attacker intercepts the information in transit without altering it.<\/p>\n\n\n\n<ol><li>Active Attack<\/li><li>Invasive Attack<\/li><li>Passive Attack<\/li><\/ol>\n\n\n\n<p>Answer: 3)Passive Attack<\/p>\n\n\n\n<p>12.The process of converting a message to an unintelligible form with the help of an algorithm and a key is known as _______.<\/p>\n\n\n\n<ol><li>Cryptography<\/li><li>Encryption<\/li><li>Cryptology<\/li><li>Cryptanalysis<\/li><\/ol>\n\n\n\n<p>Answer: 2)Encryption<\/p>\n\n\n\n<p>13.What is the practice and study of techniques for secure communication in the presence of third parties, commonly called?<\/p>\n\n\n\n<ol><li>Cryptography<\/li><li>Encryption<\/li><li>Cryptanalysis<\/li><li>Cybersecurity<\/li><\/ol>\n\n\n\n<p>Answer: 1)Cryptography<\/p>\n\n\n\n<p>14.Which of the following security attribute is compromised when data or information is changed or tampered, either accidentally or maliciously?<\/p>\n\n\n\n<ol><li>Availability<\/li><li>Integrity<\/li><li>Confidentiality<\/li><li>Repudiation<\/li><\/ol>\n\n\n\n<p>Answer: 2)Integrity<\/p>\n\n\n\n<p>15.Which of the following encryption methods is more suited for key exchange, non-repudiation, and authentication?<\/p>\n\n\n\n<ol><li>Assymmetric Key Encryption<\/li><li>Symmetric Key Encryption<\/li><\/ol>\n\n\n\n<p>Answer: 1)Assymmetric Key Encryption<\/p>\n\n\n\n<p>16.Passive attacks are considered a threat to _______.<\/p>\n\n\n\n<ol><li>Authenticity<\/li><li>Availability<\/li><li>Confidentiality<\/li><li>Integrity<\/li><\/ol>\n\n\n\n<p>Answer: 3)Confidentiality<\/p>\n\n\n\n<p>17.Which of the following attack method aims to gather confidential information by deceiving the victim?<\/p>\n\n\n\n<ol><li>Phishing<\/li><li>Spoofing<\/li><li>Drive-by Download<\/li><li>Spamming<\/li><\/ol>\n\n\n\n<p>Answer: 1)Phishing<\/p>\n\n\n\n<p>18.Which encryption method is more suitable for quickly encrypting large amounts of data?<\/p>\n\n\n\n<ol><li>Assymmetric Key Encryption<\/li><li>Symmetric Key Encryption<\/li><\/ol>\n\n\n\n<p>Answer: 2)Symmetric Key Encryption<\/p>\n\n\n\n<p><strong>Time to Evaluate Your Understanding!<\/strong><\/p>\n\n\n\n<p>1.A type of assessment that is often performed in a sandbox-virtual environment to prevent malware from actually infecting production systems is known as _________.<\/p>\n\n\n\n<ol><li>Black Box Testing<\/li><li>Dynamic Analysis<\/li><li>Static Analysis<\/li><li>Penetration Testing<\/li><\/ol>\n\n\n\n<p>Answer: 2)Dynamic Analysis<\/p>\n\n\n\n<p>2.A proactive process to predict potential risks efficiently.<\/p>\n\n\n\n<ol><li>Threat Modeling<\/li><li>Threat Analysis<\/li><li>Threat Hunting<\/li><li>Threat Landscaping<\/li><\/ol>\n\n\n\n<p>Answer: 2)Threat Hunting<\/p>\n\n\n\n<p>3.SABSA Framework is commonly represented as _______ SABSA matrix.<\/p>\n\n\n\n<ol><li>4&#215;4<\/li><li>8&#215;8<\/li><li>5&#215;5<\/li><li>6&#215;6<\/li><\/ol>\n\n\n\n<p>Answer: 4)6&#215;6<\/p>\n\n\n\n<p>4.A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is called _________.<\/p>\n\n\n\n<ol><li>Invisible Threats<\/li><li>Hidden Threats<\/li><li>Advanced Persistent Threats<\/li><li>Malicious threats<\/li><\/ol>\n\n\n\n<p>Answer: 3)Advanced Persistent Threats<\/p>\n\n\n\n<p>5.A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker&#8217;s pov is called ___________.<\/p>\n\n\n\n<ol><li>Threat Landscaping<\/li><li>Threat Modeling<\/li><li>Threat Analysis<\/li><li>Threat Hunting<\/li><\/ol>\n\n\n\n<p>Answer: 2)Threat Modeling<\/p>\n\n\n\n<p>6.Which of the following are the three phases of Incident response maturity assessment?<\/p>\n\n\n\n<ol><li>Prepare, Response, and Follow-up<\/li><li>Prepare, Identify, and analyze<\/li><li>Reconnaissance, Installation, Command, and control<\/li><li>Identify, Decompose, and Mitigate<\/li><\/ol>\n\n\n\n<p>Answer: 1)Prepare, Response, and Follow-up<\/p>\n\n\n\n<p><strong>Time to Evaluate Your Understanding!<\/strong><\/p>\n\n\n\n<p>1.Phishing emails include fake notifications from banks and e-payment systems.<\/p>\n\n\n\n<ol><li>False<\/li><li>True<\/li><\/ol>\n\n\n\n<p>Answer: 2)True<\/p>\n\n\n\n<p>2.Which of these is true with respect to passwords?<\/p>\n\n\n\n<ol><li>None of the options<\/li><li>Passwords need to be easy<\/li><li>Passwords can be kept openly<\/li><li>Passwords need to be atleast 8 chars of length<\/li><\/ol>\n\n\n\n<p>Answer: 4)Passwords need to be atleast 8 chars of length<\/p>\n\n\n\n<p>3.Which of these are Threats related to Email Security?<\/p>\n\n\n\n<ol><li>All the options<\/li><li>Spoofing<\/li><li>Pharming<\/li><li>Phishing<\/li><li>Spam<\/li><\/ol>\n\n\n\n<p>Answer: 1)All the options<\/p>\n\n\n\n<p>4.How do we define RADIUS?<\/p>\n\n\n\n<ol><li>Remote Authorization Dial-In User Service.<\/li><li>Remote Authentication Dial-In User Service.<\/li><li>Remote Authentication Service.<\/li><li>Remote Authentication Dial-In Unified Service.<\/li><\/ol>\n\n\n\n<p>Answer: 2)Remote Authentication Dial-In User Service.<\/p>\n\n\n\n<p><strong>Final Assessment<\/strong><\/p>\n\n\n\n<p>1.________ is designed to extract data from its host computer for marketing purposes.<\/p>\n\n\n\n<ol><li>Ransomware<\/li><li>Trojans<\/li><li>Adware<\/li><li>Spyware<\/li><\/ol>\n\n\n\n<p>Answer: 4)Spyware<\/p>\n\n\n\n<p>2.The telephone version of phishing that exploits social engineering techniques is known as __________.<\/p>\n\n\n\n<ol><li>Pharming<\/li><li>Smishing<\/li><li>Vishing<\/li><\/ol>\n\n\n\n<p>Answer: 3)Vishing<\/p>\n\n\n\n<p>3.A type of assessment that is often performed in a sandbox-virtual environment to prevent malware from actually infecting production systems is called ________.<\/p>\n\n\n\n<ol><li>Static Analysis<\/li><li>Black Box Testing<\/li><li>Dynamic Analysis<\/li><li>Penetration Testing<\/li><\/ol>\n\n\n\n<p>Answer: 3)Dynamic Analysis<\/p>\n\n\n\n<p>4.The three chains of RADIUS Security are ___________________.<\/p>\n\n\n\n<ol><li>Authentication, Availability, Accounting<\/li><li>Authorization, Availability, Accounting<\/li><li>Authentication, Authorization, Accounting<\/li><\/ol>\n\n\n\n<p>Answer: 3)Authentication, Authorization, Accounting<\/p>\n\n\n\n<p>5.An error message displayed on the system, symbolizes virus infection.<\/p>\n\n\n\n<ol><li>False<\/li><li>True<\/li><\/ol>\n\n\n\n<p>Answer: 1)False<\/p>\n\n\n\n<p>6.A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is known as ______________.<\/p>\n\n\n\n<ol><li>Malicious threats<\/li><li>Advanced Persistent Threats<\/li><li>Hidden Threats<\/li><li>Invisible Threats<\/li><\/ol>\n\n\n\n<p>Answer: 2)Advanced Persistent Threats<\/p>\n\n\n\n<p>7.As an application of cryptography, digital Signatures and MACs can be used for _____________.<\/p>\n\n\n\n<ol><li>Confidentiality<\/li><li>Integrity<\/li><li>Availability<\/li><li>Authentication<\/li><\/ol>\n\n\n\n<p>Answer: 4)Authentication<\/p>\n\n\n\n<p>8.The process of converting a message to an unintelligible form with the help of an algorithm and a key is known as _______.<\/p>\n\n\n\n<ol><li>Encryption<\/li><li>Cryptography<\/li><li>Cryptanalysis<\/li><li>Cryptology<\/li><\/ol>\n\n\n\n<p>Answer: 1)Encryption<\/p>\n\n\n\n<p>9._________ is a standalone software that does not need human help\/host program to spread.<\/p>\n\n\n\n<p>Ransomware<\/p>\n\n\n\n<ol><li>Worm<\/li><li>Trojan<\/li><li>Virus<\/li><\/ol>\n\n\n\n<p>Answer: 2)Worm<\/p>\n\n\n\n<p>10.What is PUP?<\/p>\n\n\n\n<ol><li>Potentially Unwanted Program<\/li><li>Practially Unwanted Program<\/li><li>Potentially Unwanted Procss<\/li><li>Practically Unrelated Program<\/li><\/ol>\n\n\n\n<p>Answer: 1)Potentially Unwanted Program<\/p>\n\n\n\n<p>11._________ is commonly known for providing backdoor access to the system for malicious users.<\/p>\n\n\n\n<ol><li>Trojans<\/li><li>Worms<\/li><li>Rootkits<\/li><li>Botnets<\/li><\/ol>\n\n\n\n<p>Answer: 1)Trojans<\/p>\n\n\n\n<p>12.Which of the following is a physiological biometric that could be used for authentication?<\/p>\n\n\n\n<ol><li>Signature<\/li><li>Voice Recognition<\/li><li>Facial Recognition<\/li><li>Gait<\/li><li>All the options<\/li><\/ol>\n\n\n\n<p>Answer: 3)Facial Recognition<\/p>\n\n\n\n<p>13.Which of the following encryption methods is more suited for key exchange, non-repudiation, and authentication?<\/p>\n\n\n\n<ol><li>Symmetric Key Encryption<\/li><li>Assymmetric Key Encryption<\/li><\/ol>\n\n\n\n<p>Answer: 2)Assymmetric Key Encryption<\/p>\n\n\n\n<p>14.What is the type of malware that restricts access to the computer either by encrypting files on the hard drive or by displaying messages demanding a ransom?<\/p>\n\n\n\n<ol><li>Ransomware<\/li><li>Spyware<\/li><li>Trojans<\/li><li>Scareware<\/li><\/ol>\n\n\n\n<p>Answer: 1)Ransomware<\/p>\n\n\n\n<p>15.A pharming tactic in which the DNS table in a server is modified to deceive users by redirecting to fraudulent websites.<\/p>\n\n\n\n<ol><li>DNS Phishing<\/li><li>Smishing<\/li><li>Vishing<\/li><li>DNS Poisoning<\/li><\/ol>\n\n\n\n<p>Answer: 4)DNS Poisoning<\/p>\n\n\n\n<p>16.Threats can exploit assets if assets are not vulnerable.<\/p>\n\n\n\n<ol><li>False<\/li><li>True<\/li><\/ol>\n\n\n\n<p>Answer: 1)False<\/p>\n\n\n\n<p>17.Which of the following security attribute is compromised when data or information is changed or tampered, either accidentally or maliciously?<\/p>\n\n\n\n<ol><li>Availability<\/li><li>Confidentiality<\/li><li>Integrity<\/li><li>Repudiation<\/li><li>Confidentiality and Integrity<\/li><\/ol>\n\n\n\n<p>Answer: 5)Confidentiality and Integrity<\/p>\n\n\n\n<p>18.Which of the following is an effective solution to ensure confidentiality?<\/p>\n\n\n\n<ol><li>Logging and Auditing<\/li><li>Encryption<\/li><li>Network Monitoring<\/li><li>Data Hiding<\/li><\/ol>\n\n\n\n<p>Answer: 2)Encryption<\/p>\n\n\n\n<p>19.A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker&#8217;s pov is called _______________.<\/p>\n\n\n\n<ol><li>Threat Modeling<\/li><li>Threat Landscaping<\/li><li>Threat Analysis<\/li><li>Threat Hunting<\/li><\/ol>\n\n\n\n<p>Answer: 1)Threat Modeling<\/p>\n\n\n\n<p>20.__________ is a proactive process to predict potential risks efficiently.<\/p>\n\n\n\n<ol><li>Threat Hunting<\/li><li>Threat Modeling<\/li><li>Threat Analysin<\/li><li>Threat Landscaping<\/li><\/ol>\n\n\n\n<p>Answer: 1)Threat Hunting<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Prologue Fresco Play MCQs Answers Time to Evaluate Your Understanding! 1.Malware cannot inflict physical damage to systems. True False Answer: 2)False 2.The type of malware that restricts access to the computer either by encrypting files on the hard drive or by displaying messages demanding a ransom is called __________. [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":663,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":""},"categories":[156],"tags":[],"_links":{"self":[{"href":"https:\/\/emorah.com\/story\/wp-json\/wp\/v2\/posts\/708"}],"collection":[{"href":"https:\/\/emorah.com\/story\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/emorah.com\/story\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/emorah.com\/story\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/emorah.com\/story\/wp-json\/wp\/v2\/comments?post=708"}],"version-history":[{"count":1,"href":"https:\/\/emorah.com\/story\/wp-json\/wp\/v2\/posts\/708\/revisions"}],"predecessor-version":[{"id":709,"href":"https:\/\/emorah.com\/story\/wp-json\/wp\/v2\/posts\/708\/revisions\/709"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/emorah.com\/story\/wp-json\/wp\/v2\/media\/663"}],"wp:attachment":[{"href":"https:\/\/emorah.com\/story\/wp-json\/wp\/v2\/media?parent=708"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/emorah.com\/story\/wp-json\/wp\/v2\/categories?post=708"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/emorah.com\/story\/wp-json\/wp\/v2\/tags?post=708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}