Q. 1. The term used to describe an email that is targeting a specific person is known as
(A) Spam
(B) Phishing
(c) Vishing
(D) Spear phishing
Q. 2. Machine learning is a subset of which of the following.
(A) Deep learning
(B) Data learning
(C) Artificial intelligence
(D) None of the above
Q. 3. What is the term used when a cybercriminal sends a fraudulent email disguised as being from a legitimate, trusted source?
(A) Trojan
(B) vishing
(C) Phishing
(D) backdoor
Q. 4. Who is the father of Machine Learning?
(A) Geoffrey Everest Hinton
(B) Howard Hinton
(C) George Everest
(D) Colin Clarkf
Q. 5.Personal Identifiable Information (PII) is used to distinguish one person from another and verify your identity. Which of the following is an example of PII?
(A) ID Number
(B) Date of Birth
(C) Home Address
(D) All of the answers are correct
Q. 6.Who is responsible for information security within your company?
(A) IT Security Department
(B) Everyone in the Company
(C) IT Department
(D) Top Management
Q. 7. Tailgating is a form of social engineering that allows hackers to:
(A) Watch company’s main gate
(B) Get unauthorized access to restricted area
(C) Watch employees as they leave gates
(D) Follow employee after work
Q. 8. Which one of the following can protect a computer from the risk of unwanted emails?
(A) Anti-Spam Software
(B) Anti-Virus Software
(C) Anti-Spyware Software
(D) PC Diagnostic Software
Q. 9. If you want to share a password with someone, what's the best option?
(A) Tell it via the phone
(B) Send a text message
(C) Send it via email
(D) None of the above
Q. 10. Which one of the following describes why firewalls are used?
(A) To prevent unauthorised access by incoming transmissions.
(B) To prevent destruction of a computer in the event of a fire.
(C) To enable easy downloading of data from web sites
(D) To detect and disable viruses already on a computer.
Answers
Q.1. Answer: D
Notes: Spear phishing is a phishing method that targets specific persons or targets.
Spear Phishing occurs when a malicious party obtains information about the targeted individuals from websites or social networking sites and customize a phishing scheme to them
Q.2. Answer: C
Notes: Deep learning is a subset of machine learning, and machine learning is a subset of Artificial Intelligence.
Q.3. Answer: C
Notes: Phishing is an email used by cybercriminals who create fraudulent messages that are meant to lure a user into either revealing sensitive or confidential information or installing malware.
Q.4. Answer: A
Notes: Geoffrey Everest Hinton is the father of Machine Learning.
Q.5. Answer: D
Notes: Personally identifiable information (PII) is any data that is used to identify a specific individual. All information that directly or indirectly links to a person is considered PII. One's name, email address, phone number, bank account number, and government-issued ID number are all examples of PII.
Q.6. Answer: B
Notes: Everyone bears the responsibility for information security in an organization?
Q.7. Answer: B
Notes: In information security, tailgating is a social engineering technique used by hackers to deceive organization's officials through direct speech or actions in order to gain access into restricted areas. An example of tailgating is when one person tags along with an authorized employee to access a building or pass a certain checkpoint.
Q.8. Answer: A
Notes: Anti-Spam Software has the potential of protecting your computer from the risk of unwanted emails.
Q.9. Answer: D
Notes: A password is personal data which shouldn't be shared with others.
Q.9. Answer: A
Notes: Firewalls are used to prevent unauthorised access by incoming transmissions.
No comments:
Post a Comment