Computer System Security 1st Week Solution

2
8203
AKTU Computer System Security
AKTU Computer System Security

Disclaimer for ReGyan

If you require any more information or you have any problem regarding Copyright or have any questions about our site’s disclaimer, please feel free to contact us by email at hello@regyan.com.

 


Also See:- Computer System Security 7th Week Solution

Disclaimers for ReGyan

All the information on this website is published in good faith and for general information and educational purpose only. ReGyan does not make any warranties about the completeness, reliability, and accuracy of this information. Any action you take upon the information you find on this website (regyan.com), is strictly at your own risk. will not be liable for any losses and/or damages in connection with the use of our website.

 


Two Subjects Cyber Computer System Security and Python Programming – A Practical Approach are important. This article contains Computer System Security 1st Week Solution. So go ahead and check your answers if you already have submitted.

[1] What was the percentage increase in Zero Day Vulnerabilities in the year 2015?

  • (a) 4%
  • (b) 50%
  • (c) 100%
  • (d) 125%
Answer: (d) 125%

[2] What hacking attacks were mentioned in the lesson?

  • (a)  Hacking in French Election
  • (b)  ATM Hacking in India
  • (c)  Denial of Service attack in Turkish Bank
  • (d)  All of the above




Answer: (d)  All of the above

[3]  Identify the software whose vulnerability is exploited the most?

  • (a) Android
  • (b) Browser
  • (c) Adobe Flash Player
  • (d) Microsoft Office

Answer: (b) Browser

[4]  The computer vulnerabilities and exploits databases are maintained by _________.

  • (a) Kaspersky Lab
  • (b) Symantec Corporation
  • (c) MITRE Corporation
  • (d) None of the above




Answer: (c) MITRE Corporation

[5]  Which of the following is/are correct with respect to Ransomware?

  • (a) It is a form of Malware
  • (b) It encrypts the whole hard drive of the computer, essentially locking the user out of the entire system.
  • (c) It locks the system’s screen or locks the users’ files unless a ransom is paid.
  • (d) All of the above

Answer: (d) All of the above

Also See:- Python Quiz -Programming 1st and 2nd Week Quiz Solution

[6] Which of the following is considered legal?

  • (a) Hacking a social media account and sending a private message
  • (b) Hacking a bank account and siphoning funds
  • (c) Hacking a company’s security system with permission from the management
  • (d) All of the above




Answer: (c) Hacking a company’s security system with permission from the management

[7] What is the cost of launching Denial of Service attack on a website?

  • (a) $20/hr
  • (b) $100/day
  • (c) $300/mont
  • (d) Both A and B




Answer: (d) Both A and B

[8] Which of the following is not an advantage of studying Cyber Security?

  • (a) It gives you the ability to hack a computer system
  • (b) It allows you to know the ways through which cyberspace can be breached
  • (c) Both A and B
  • (d) None of the above

Answer: (d) None of the above

[9]  Which of the following is correct for silent banker?

  • (a) It is a trojan horse
  • (b) It records keystrokes, captures screens and steals confidential banking credentials and sends them to a remote attacker
  • (c) Both A and B
  • (d) None of the above




Answer: (c) Both A and B

[10] Which of the following is not a part of Security System Centric Design?

  • (a) Policy
  • (b) Agreement
  • (c) Mechanisms
  • (d) Threat Models

Answer: (b) Agreement

[11] Which of the following is not a goal in the security system design?

  • (a) Vulnerability
  • (b) Confidentiality
  • (c) Integrity
  • (d) Availability




Answer: (a) Vulnerability

[12]  Which of the following is most important in design of secure system?

  • (a) Assessing vulnerability
  • (b) Changing or Updating System according to vulnerability
  • (c) Both A and B
  • (d) None of the above




Answer: (c) Both A and B

[13] Which of the following is correct with respect to Penetration testing?

  • (a) It is an internal inspection of Applications and Operating systems for security flaws.
  • (b) It is an authorized simulated cyber-attack on a computer system, performed to evaluate the security of the system
  • (c) It is hacking a security system of an organization.
  • (d) All of the above

Answer: (b) It is an authorized simulated cyber-attack on a computer system, performed to evaluate the security of the system

[14] Which of the following is to be done to avoid limitations in threat models?

  • (a) Making more explicit and formalized threat models to understand possible weaknesses
  • (b) Making simpler and more general threat models
  • (c) Making less assumptions to design a better threat model
  • (d) All of the above




Answer: (d) All of the above

In this post solution of 1st-week Computer System Security is given.

 

 

2 COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here