CSCU
CSCU
CSCU
1. As part of his security implementation plan, Glenn was updating his firewall. Which aspect of
the security implementation plan was Glenn working on ?
a. Precaution = memperbaharui secara berkala
b. Maintenance = back up data
c. Reaction = reinstal aplikasi sistem
d. Nonrepudiation = Nonrepudiation is the process that ensures accuracy of the sender and
receiver of a message.
2. You received the following email from an official claiming to be from your bank. Dear ABC
Bank User, Since we will be updating our customer database shortly, you are kindly requested to
send the following information.
• Name
• Bank login id
• Password
• Branch
• Date of birth
• Alternate email
Please click the below link to update your details.
Proceed to update your account details
Please contact the ABC Bank customer team in case of any queries. Thank you for your
cooperation.
Which type of email security threat is this ?
a. Nigerian scam = In this scam, the victim receives an email originating usually from Nigeria
or any other African country.
b. Malicious email attachment = Malicious executables, spread through email attachments,
pose a major security risk to emails. These executables, if undetected, may obtain
confidential information without the user’s knowledge or may damage a system
c. Phishing = The Attacker sends an email asking for user’s personal/financial information
along with a link similar to the genuine website. Attackers send emails that appear to have
come from valid organizations, such as banks or partner companies. Email can also carry
hyperlinks that may tempt a member of your staff to breach company security.
d. Spy-phishing =
3. Which of the following terms refers to the process of protecting information, and the
infrastructure that stores it?
a. Availability = Availability ensures that once the user captures the data in a computer system,
it must make the data available to the users when they request it. The availability of data to
the authorized users, at any point of time, is one of the most important purposes of a
computer.
b. Data security = Attackers send emails that appear to have come from valid organizations,
such as banks or partner companies. Email can also carry hyperlinks that may tempt a
member of your staff to breach company security.
c. Maintenance = System maintenance involves actions, which support the precautionary
measures and help in securing the devices. Taking only precautionary measures is not
enough. Users have to constantly check the efficacy of the precautionary measures and
update them when required
d. Keystroke logging
4. Raymond received an email from an official claiming to be from his bank. The email requested
Raymond to send his personal details since the customer database of the bank was being
updated. Upon confirmation from the bank, Raymond was told that the bank had not sent any
emails asking for the personal details of their customers. Which cyber-attack would Raymond
have been a victim of if he had replied to the email ?
a. Man in the middle attack = In a man in the middle attack, attackers seeking unauthorized
access to a Bluetooth device inserts themselves in an authorized Bluetooth communication
between two devices.
b. Eavesdropping = is the unauthorized real-time interception of a private communication such
as, a phone call, instant message, or video conference. The term eavesdrop is derived from
the practice of actually standing under eaves of a house, listening to conversations inside.
c. War driver = A war driver attack is when someone connects to a non-secure Wi-Fi
network, and breaches data being exchanged on it. This attack can be performed by
anyone within range of the router.
d. Phishing = pengelabuan
5. Which of the following terms refers to the process that ensures accuracy of the sender and
receiver of a message?
a. Data
b. Non Repudiation = Nonrepudiation is the process that ensures accuracy of the sender and
receiver of a message.
c. Availability
d. Authenticity = Authenticity refers to the truthfulness of the origin of data. It ensures the
claimed source of data is actually the origin of that data and that the data has not been
tampered with since its creation.
6. Luke works as an analyst for AS Pvt. Ltd. His job there is to analyze statistics and records
obtained from people to improve the sales of the company. However, recently the statistics and
records given to him have been incorrect, thus leading to gross miscalculations and wrong
predictions on his part. Which of the terms listed below, best describes these statistics and
records that are incorrect ?
a. Indicators
b. Data
c. Information
d. Archives
7. Sam uses his work laptop to watch pirated movies at home sometimes. When he tried to watch
the latest movie he downloaded, the movie file did not play even after trying on several different
players. Within a day of this, Sam noticed that many of his files were vanishing one after the
other from his laptop even though neither he nor anyone else deleted them. The network
administrator of his company, after taking a look at his computer told him that the movie files,
which did not play, definitely had something to do with this peculiar behavior. What type of data
loss could this be ?
a. Computer virus = When hit by a virus, data on the victim system, and any system connected
to it via a network, is rendered inaccessible and even irretrievable.
b. Human error = Human errors are the primary cause of data loss and they include unintended
deletions, accidental formatting of the hard drive, and mistakes on part of the administrator.
c. Natural disaster = When hit by a virus, data on the victim system, and any system connected
to it via a network, is rendered inaccessible and even irretrievable.
d. Software failure = An operating system failure or crash results in data stored on the host
device being inaccessible. A similar crash in any of the applications or software on the
device results in loss of data that the software manages. For example, if a word processing
program crashes, unsaved work on a word file is lost.
8. Which of the following fundamental concepts of security refers to an action taken in advance to
protect the system against threats or dangers?
a. Precaution = Precaution is an action taken in advance to protect the system against threats or
dangers.
b. Nonrepudiation
c. Maintenance = System maintenance involves actions, which support the precautionary
measures and help in securing the devices. Taking only precautionary measures is not
enough. Users have to constantly check the efficacy of the precautionary measures and
update them when required.
d. Reaction = No security measure is foolproof. The risk of a security incident can never be
brought down to zero, it can only be reduced. By minimizing security risks, the majority of
data breach attempts will be avoided.
9. Isaac is transferring all the data from his computer to an external drive as he wants to format his
laptop. While moving the data, he accidentally hits delete instead of cut on one of the files and
without realizing, hit the enter key when the computer prompted to confirm his action. As the
file was a huge one, it did not go to the recycle bin and got permanently deleted. What type of
data loss is this ?
a. Computer virus
b. Human error
c. Software failure
d. Hardware theft = pencurian perangkat keras
10. Imagine getting a letter from the Inland Revenue Authority of Singapore (IRAS) demanding that
you pay $5,700 in taxes. This is what happened to Rick. He received a letter informing him that
he owed the government unpaid income tax on wages he never earned. The IRAS letter said that
Rick had worked at several places. However, Rick is only 15 years old and his only job was
working at his uncle’s grocery store during the summer. He had never even visited some of the
places where the letter said he worked. Rick was not sure what to do next. After all, he has never
even had a “real” job like those listed in the letter. What is going on in this scenario?
a. Social engineering = menggunakan pihak keluarga/teman untuk meyakinkan korban
b. Nigerian scam = meninta sejumlah uang
c. Phishing = pelaku meminta data pribadi menggunakan link palsu
d. Identity Theft = Identity theft refers to the process of stealing someone’s personal
information with the intention of using it for illegal activities.
11. Fred, a 14 year-old boy, is an only child. Fred loves spending time on his Mac OS X browsing
the internet. When his parents are not at home, he spends hours at a stretch on the computer.
Once, when Fred’s parents come home late from work and find him on the Mac, they decided to
limit his computer time. Enabling an inbuilt feature in the Mac, Fred’s parents limit his
computer time to two hours daily. Which MAC OS X feature did Fred’s parents enable ?
a. Jump lists = Jump Lists are lists of recently accessed items, such as files, folders, or
websites, organized by the program which was used to open them.
b. File Vault = FileVault is an encryption program in Mac that helps users to protect their data.
It uses a password based lock mechanism to encrypt the files present on the entire OS X
startup volume and typically includes the home directory.
c. UAC slider bar = User Account Control (UAC) is a Windows security feature which
prevents unauthorized users from accessing a computer. It alerts the administrator of the
computer when any application or user tries to make changes to the system. UAC works by
continuously fixing the adjustment level of the user account.
d. Parental control = Click Time Limits tab to set time limits for weekdays, weekends, and
bedtime.
12. Lucy, a 55 year-old woman, was not a technically savvy person. She did not install or enable
any applications on her computer, and only used it for looking up recipes and knitting patterns.
After some time, Lucy’s computer started giving her problems. It often displayed the Blue
Screen of Death (BSOD) and unwanted windows kept popping up whenever she went online.
When a computer technician checked Lucy’s computer, it was discovered that her computer was
infected with malware. Which inbuilt Windows software should Lucy have enabled to prevent
malware infection in her computer?
a. Jump lists
b. Task manager
c. Simple file sharing
d. Windows Defender
13. Which of the following is an encryption program in Mac that helps users to protect their data ?
a. Safari
b. SPAMfighter
c. Lockbin
d. FileVault = FileVault is an encryption program in Mac that helps users to protect their data.
14. Which of the following refers to the periodic patching of system files to fix any issues in the
previous version of the Windows OS ?
a. Windows Firewall
b. Task manager
c. FileVault
d. Windows Updates = Software updates are a must for every computer. They help in resolving
the issues present in the previous version of the software, and also to plug the security holes
present in the system.
15. Samuel, a network admin in an IT firm, has just discovered a phishing site known for targeting
corporate entities. Several employees have received emails with the domain name, which is the
same as that of this site. In order to prevent the company’s network from being corrupted,
Samuel decides to block all incoming and outgoing traffic from that site. Which of the following
defense mechanisms can Samuel use to implement this ?
a. Encryption
b. Disk encryption
c. Firewall = A firewall is a hardware device/software program installed either on network or
locally on the host device to secure the communication between different networks
according to a predefined security policy. Windows OS features a built-in firewall for
scanning all the incoming and outgoing traffic for malicious data.
d. Virus
16. Ellie, an 18 year-old student, shares her Windows computer with her younger brother, Adam.
Adam is very mischievous and whenever he is on the computer, he ruins Ellie’s college
assignments. Ellie, who is fed up of this decides to encrypt the drive that contains her
assignments. She uses inbuilt Windows software to encrypt the drive so that Adam cannot
access the drive. Which software did Ellie use ?
a. Skype
b. BitLocker = BitLocker is an encryption software that allows users to encrypt full disks in
order to protect the data. Using BitLocker, users can encrypt hard drives and any removable
media on the computer.
c. SPAMfighter = SPAMfighter prevents unwanted spam advertisements and provides PC
optimization, security, and protection solutions. It improves the performance of the system
in terms of operating speed by saving the bandwidth and also removes the existing spam
content. SPAMfighter also prevents spam mail from entering the inbox.
d. Adobe
17. Which of the following terms refers to software that attackers create to install on a victim’s
computer in order to compromise its security ?
a. Bitlocker
b. Dropbox
c. Malware
d. Lockbin = Lockbin, the free online email encryption service
18. Which of the following antivirus techniques refers to the process of comparing the current state
of stored programs to a previously recorded state, which is known to be free of malware ?
a. Heuristics analysis
b. Scanning
c. Integrity checking = It’s the process of comparing current state of stored programs to a
previously recorded state which is known to be free of malware.
d. Bookmarks method
19. Sally is a 16-year-old high school student who is extremely attached to her laptop. She uses it to
download and watch episodes of her favorite sitcom. While watching one of the episodes, her
laptop switched off automatically a couple of times. Suspecting a malware infection, she opened
the antivirus software on her laptop and chose a technique, which examined all files on the
memory and hard disk in order to identify and locate the malware. Which antivirus technique
did Sally employ ?
a. Heuristics analysis
b. Bookmarks method
c. Scanning = Antivirus software scans all files in memory and on the hard disk for code
snippets (small blocks of reusable code that can be inserted in a code file) which uniquely
identify a file as virus.
d. Integrity checking
20. Daniel, a bank officer, communicates with his clients through emails on a daily basis. Recently,
he noticed that his Gmail inbox was filled with unsolicited emails. The cluttered inbox annoyed
him, as it was difficult to filter the important emails. Hence, he decided to find a solution for it.
Upon inquiry, a service provider told him that he could use software which automatically filters
out the unsolicited emails. This software would not only protect his Gmail account, but also
protect all the email accounts configured on his email client. Which of the following tools did
Daniel probably enquire about ?
a. Kaspersky
b. Norton
c. SPAMfighter
d. Avast Pro
21. Harry, a 21 year-old college-going student, was working on his dissertation when suddenly a
message flashed on his screen, “All files on your computer have been encrypted. You must pay
$1000 within 72 hours to regain access to your data.”Even after Harry paid the money, he was
not able to access his data, and all the documents on his dissertation were lost. Which malware
attack was Harry a victim of ?
a. Adware
b. Ransomware = Ransomware is a malware which prevents users from accessing their
computer systems. After finding its way into a system, it encrypts all the files on it and holds
the password which can decrypt it, ransom. Ransomware is similar to kidnapping a person—
the person would only be released when ransom has been paid, and here the data is only
retrieved when the ransom was paid. Just like in kidnapping, paying the ransom doesn’t
guarantee the safety of the data.
c. Botnet
d. Virus
22. Horace is a 64 year-old man who worked as an accountant for SN Associates before his
retirement. The company gifted him a laptop at the time of his retirement. Since Horace was not
a technically savvy person, he did not install any applications on his laptop, and only used it for
checking his email and playing poker online. After some time, Horace’s laptop started giving
him problems. It crashed frequently, often displayed the Blue Screen of Death (BSOD), and
unwanted windows kept popping up whenever he went online. When Horace took his laptop to
the service center, he was told that his laptop was infected with malware. Which software should
Horace have installed to prevent malware infection in his laptop ?
a. One Drive
b. Skype
c. Adobe Reader
d. Antivirus software
23. Susan downloaded a software from the Internet and installed it on her computer for watching
movies online. After installing the software, she noticed that her PC was slowing down and was
taking more time to open webpages. What could Susan do to solve this problem ?
a. Start using Ethernet
b. Install a latest antivirus software and scan her computer
c. Choose a suitable encryption method
d. Stop using wireless internet connection
24. John is an 18 year-old college-going student. He loves to read books and listen to music on his
laptop. He regularly downloads e-books and music from the internet. Lately, whenever John has
been spending time on his laptop, the laptop begins displaying the infamous Blue Screen of
Death (BSOD). Upon taking his laptop to the service center, John was told that his laptop was
infected with malware. Which symptom of malware infection is John’s laptop displaying ?
a. Slow system
b. Laptop screen malfunction
c. Unexpected crashes = Unexpected System Crashes- If a system is regularly crashing or is
displaying the infamous Blue Screen of Death (BSOD), then something is definitely wrong
with that computer. A BSOD is the worst type of error a computer experiences and is
usually caused by faulty hardware. The crash is either due to a technical issue caused by
incompatibility or it is a malware. If a malware does exist, it’s detected by running a system
scan on the computer using antivirus software.
d. Hard drive malfunction
25. Certain software applications add or modify a particular feature in a browser. A few versions
allow users to block ads, watch online videos, or IM with friends. What is this application
called?
a. Cookies = Cookies are files that record users’ browsing history and are stored locally on
their computers. It is a common experience to frequently see ads of those products that we
search for on any e-commerce website.
b. Extensions = This software adds or modifies a particular feature in a browser. Some
extensions allow users to block ads, watch online videos, or IM with friends.
c. ActiveX = This is a software component which comes installed as part of Windows
Explorer. ActiveX is required by some websites to display certain elements or to improve
general browsing experience as a whole.
d. Jawa = It’s a programming language used to create applications on computers or active
content on the Internet. Java has two parts—the application that runs on computers, and the
browser plugin.
27. Susan, a 15-year-old girl, loves spending her free time baking and cycling. However, recently
she has been spending all of her free time glued to the computer. She shows no interest in her
hobbies anymore and looks depressed most of the time. Her parents also noticed that whenever
they enter her room, she quickly changes the computer screen. Understandably, Susan’s parents
are worried about her. What could be the reason for her behavior ?
a. Too much pressure at school
b. Unsolicited emails
c. Victim of online child abuse
d. Social engineering
28. Tom, a 14 year-old boy has been chatting online with Adam, whom Tom assumes is 14 years
old as well. Over the months, they built up a great ‘online’ friendship, playing online games,
checking out EDM websites, continuing with their friendly rivalry over football, and just talking
about ‘guy’ stuff. When Adam invited Tom over to meet him, Tom was obviously excited.
However, when Tom met Adam, he was shocked, as Adam turned out to be a 35 years old man.
Despite this shock, Tom entered Adam’s house, as he trusted him. Tom was having a great time
playing PS3 with Adam, until the time Adam touched him inappropriately. Tom ran away from
Adam’s house and did not know what to do. Which form of cyber-attack was Tom a victim of ?
a. Pornography
b. Phishing
c. Grooming = Grooming is one of the major risks faced by children online. It refers to an act
of befriending and establishing an emotional connection with children, so as to prepare them
for child abuse. Attackers with malicious intent use social networking websites and chat
rooms (sometimes posing as children or teenagers themselves) to initiate conversations with
likely victims.
d. Social Engineering
29. Which of the following software programs runs on the internet and allows users to find, access,
and display web pages on your computer ?
a. Web browsers = A Web browser is a software program that runs on the Internet which
allows users to find, access, and display web pages. Browsers translate web pages into
readable human content using Hypertext Transfer Protocol (HTTP).
b. Search engine
c. Email
d. Extensions
30. Which of the following terms refers to a collection of information that defines or describes the
user and his or her interests ?
a. Facebook group
b. Account settings
c. Timeline
d. Profile
31. Hermione is a 21 year-old college student. She loves spending time on Facebook. However,
with her final exams approaching, she feels that spending time on Facebook will harm her exam
results. Hence, she enables a particular Facebook feature, with the help of which, she will not
get any emails or notifications from Facebook. Which Facebook feature did Hermione use?
a. Who can look me up = Using this option, you can limit the users who can search for you
through various criteria like email address and phone number provided in the account.
b. Login alerts
c. Deactivate account = Users may sometimes feel the urge to leave Facebook for a certain
period or permanently.
d. Where you’re logged in = Users log into their Facebook accounts from various places and
different systems or devices. In order to help them keep track of where they had logged in
previously, the social networking site features “Where You're Logged In” option
32. A newly established ITES company plans to launch a website which enables its users to share
pictures and videos with each other. Apart from this, users can also comment on these pictures
and share them further. Under which of the following cloud categories will the company’s
product come ?
a. Private Cloud = A private cloud is set up and used for a single entity or organization. It is
that organization’s private storage, hosting, and computing space.
b. Community cloud = A community cloud belongs to a group of organizations with similar
interests. The convergence of their interests may be social or commercial. This cloud can
also be called semi-private or semi-public cloud. It can be operated remotely or locally
depending upon the agreement terms of the organizations sharing it.
c. Hybrid Cloud = A hybrid cloud is a mix of two or more different kinds of cloud
architectures.
d. Public Cloud = A public cloud is the general storage and hosting service that we all as
individual consumers use. It is owned by a service provider and shared by several resource
tenants. This cloud typically operates remotely
33. ABC Info Ltd. has a part of its business already on a cloud computing platform. However, its
new product suite would need a cloud service which runs on a totally different technology. The
company should be able to make its legacy products and new products communicate with each
other as the new products are just an upgrade of the old ones and much of the required data still
resides on the old cloud. Which of the following cloud computing platforms will be suitable for
ABC Info’s future needs ?
a. Hybrid cloud
b. Private cloud
c. Community cloud
d. Public cloud
34. A new online service allows people living with roommates to feed in all their house hold
expenses in its ‘share calculator’ program. The program then calculates how much each person
is supposed to pay and sends a detailed report to all those who are listed as roommates for that
particular transaction. The above mentioned service is an example of which of the following ?
a. Platform as a Service = This cloud computing option gives the consumers the flexibility of
focusing on just the applications that they run on cloud. The underlying maintenance
complexities of building and maintaining the infrastructure needed to run these applications
are all outsourced to the cloud service provider.
b. Infrastructure as a Service = Clouds provide basic IT infrastructure to their clients in the
form of networks, virtual computers, and storage space among other things. This forms a
remote IT system for an organization which is manageable and flexible.
c. Network as a Service
d. Software as a Service = A complete software application or product can be run on cloud.
Service providers do all the heavy lifting of making sure the application is available and
managed well. Web based mail services, social networking sites are common examples of
such a service.
35. XYZ Infra Solutions, a startup company is looking for a cloud service provider who can provide
virtual machines, virtual local area network, customized software applications, on demand
storage, IP addresses, and firewalls to meet its business needs. Which of the following cloud
computing services can meet the business needs of the company ?
a. Infrastructure as a Service
b. Platform as a Service
c. Application as a Service
d. Software as a Service
36. Which privacy issue of clouds exposes users to the risk of their data being accessed by the cloud
service provider without the user’s consent ?
a. Data ownership
b. Data location
c. Data migration
d. Data permanency
37. InfraTech Inc. is an international IT company with offices in Dubai, Singapore, and Australia.
To have continuity of business practice, it is imperative that all the branch offices be able to
communicate amongst themselves. Which of the following network systems would be suitable
for data communication between the employees of all branches of InfraTech Inc. ?
a. Virtual Private Network
b. Wide Area Network = A wide area network (WAN) is a network that exists over a large-
scale geographical area.
c. Local Area Network = A LAN is an individual network that covers a single geographical
area
d. Ethernet
38. Sarah has recently rented a small room on ABC Street, and started a business with seven
employees. She provided every employee with a computer and a common printer which is
meant to be shared by everyone. Which of the following networks would suit Sarah’s business
need ?
a. Local Area Network
b. Virtual Private Network = A private network created between two or more computers is
referred to as VPN.
c. Wide Area Network
d. Ethernet Physical Layer
40. Ruth Cole is a sales manager and travels extensively on business. She regularly updates and
stores clients’ data on a remote data storage device via the Internet, so that in case she loses her
laptop or it crashes for some reason, she does not lose the data which is essential to carrying out
her work. Which type of data backup is Emma using to carry out her daily work ?
a. Differential backup = Once a full backup is done, in every subsequent update to the backup,
only those files that have changed or have been created after the previous backup, are
updated to it.
b. Full system backup = Full system backup is a backup of all the files and their respective
folders.
c. Incremental backup = Once a full backup is done, in every subsequent update to the backup,
only those files that have changed or have been created after the previous backup, are
updated to it.
d. Online data backup = Online backup is a method of creating a data backup on remote data
storage devices through the Internet.
41. Duke is taking some of the best pictures he has yet as an amateur photographer in a pen drive to
get his work assessed by an expert. On the subway an unknown person picks his pocket. Along
with his wallet Duke also lost the pen drive with his pictures. Since he had not made any more
copies of those pictures, he lost them forever. What type of data loss is this ?
a. Hardware theft = pencurian perangkat keras
b. Malware attack
c. Natural disaster
d. Software theft
42. Janine’s parents gave her a smartphone for her birthday. The phone’s operating system intrigued
and delighted Janine at the same time. This was because it was the first time she had seen a
smartphone that had a tile-based setup. In addition, the tiles could be removed and interchanged
on the home screen. Which operating system did Janine’s phone have?
a. Android = Google’s Android, powered by a Linux kernel, is an open source mobile
operating system that allows developers to access unlocked hardware and develop new
programs as they wish. Open source refers to any program which is made available for
modification by users.
b. Windows = Windows Phone is recognizable by its tile-based setup, dubbed Metro. The
Metro can be used to remove and interchange tiles on the home screen.
c. Symbian
d. iOS = Apple’s iOS can only be used in Apple’s products. It comes with Safari web browser
for Internet use, an iPod application for playing music and Apple's Mail for managing
emails. iOS responds to user’s touch—the user can tap the screen to open a program, swipe
across the screen to change pages, or dial numbers to make a call.
43. Alex, the coach of Manchester United, called up Wayne, the captain of the team, to discuss the
tactics they would employ in the upcoming Champions League Final. The following day, Alex
received an email with the transcript of the conversation he had with Wayne. The sender of the
email threatened to make Alex’s tactics public, if he did not pay him $5000. Which form of
mobile device attack was Alex a victim of ?
a. Man in the middle attack = In a man in the middle attack, attackers seeking unauthorized
access to a Bluetooth device inserts themselves in an authorized Bluetooth communication
between two devices. This enables them to intercept, steal, and modify the data being
exchanged between the devices.
b. Eavesdropping = Eavesdropping (menguping) is the unauthorized real-time interception of a
private communication such as, a phone call, instant message, or video conference. The term
eavesdrop is derived from the practice of actually standing under eaves of a house, listening
to conversations inside.
c. Social engineering
d. Phishing
44. Andrew lost his iPhone on the way home from college. He anxiously wanted to recover it,as it
was a gift from his late grandfather. The iPhone also contained pictures that he had taken for a
national photography contest. Using which iOS feature, can Andrew locate his phone?
a. iCloud backup
b. System updates
c. Find my iPhone
d. SIM lock
45. Which of the following terms refers to malicious software that is specifically built to target
mobile phones and smartphones systems ?
a. Broken cryptography = Encryption systems are being regularly upgraded as they are being
constantly solved or broken. Applications must employ secure encryption which hasn’t been
solved yet, in order to protect user data.
b. Unmanaged applications
c. Mobile malware = Mobile malware is malicious software that is specifically built to target
mobile phones and smartphones systems. This malware relies on exploiting the
vulnerabilities in smartphone operating system.
d. Phishing
46. This part of an email informs you about the address from where it came, time of the message,
date sent, and the subject line. Identify the email part ?
a. Signature = The email signature is an optional part of the sender’s information provided to
the
recipient.
b. Header = Email header contains information about the email origin such as the sender
address, the recipient address, the routing, time of the message, and the subject line.
c. Body = The body contains the actual message, including the greeting, message, and
conclusion.
d. Footer
48. Harold, an associate at AQ Corporation, received a phone call from a person claiming to be Bob
from the IT department. Bob told Harold that he had noticed that Harold’s computer was
running slow, and could help him fix it. Harold, not having much knowledge regarding
computers, readily agreed. Following Bob’s instructions, Harold typed in some commands on
his computer, and gave remote access to Bob to have his computer fixed. Later on, Harold
noticed that confidential information concerning his clients was missing from his computer.
Which attack was Harold a victim of ?
a. War driver = A war driver attack is when someone connects to a non-secure Wi-Fi network,
and breaches data being exchanged on it. This attack can be performed by anyone within
range of the router.
b. Evil twin = It is a rogue Wi-Fi network setup to look like a normal Wi-Fi network. For
example, it might have the same name as the one in the local coffee shop.
c. Bluesnarfing = In this attack, an unauthorized user hacks into an open and insecure
Bluetooth connection on a phone and steals data. Bluesnarfing is only possible if users keep
their phones in the Bluetooth discoverable mode.
d. Social engineering
49. Amy received an email from an official claiming to be from ABC Parcel Services. The email
asked her to collect a gift parcel sent by her friend three weeks ago. The service claimed that
they were unable to deliver the parcel to Amy, as the address provided was wrong. The service
asked her to print out the attached invoice copy, fill it, and collect the package from the branch
office located in her city. Which type of email security threat could Amy have faced, if she
clicked or downloaded the attachment?
a. Hoax mail = Email tipuan adalah ketika penyerang mengirim email ke calon korban yang
mencoba menakut-nakuti mereka agar menginstal malware atau mengungkapkan detail
pribadi. Surat-surat seperti “sistem dalam bahaya dan tambalan terlampir harus segera
dipasang” atau “rekening bank dikompromikan, kirim detail login untuk mengatur ulang”
adalah contoh surat tipuan.
b. Phishing = Penyerang mengirimkan email yang meminta informasi pribadi/keuangan
pengguna bersama dengan tautan yang mirip dengan situs web asli. Setelah pengguna
mengirimkan formulir perincian yang diperbarui, informasi tersebut disimpan di database
penyerang.
c. Malicious email attachment = Eksekusi berbahaya, yang disebarkan melalui lampiran email,
menimbulkan risiko keamanan utama pada email. Eksekusi ini, jika tidak terdeteksi, dapat
memperoleh informasi rahasia tanpa sepengetahuan pengguna atau dapat merusak sistem.
d. Malicious user redirection = Email mungkin berisi tautan, yang jika diklik dapat
mengarahkan Anda ke situs web yang menghosting malware.
50. Which of the following websites can Windows Phone users use to locate their stolen
smartphone?
a. android.com/devicemanager
b. http://www.symbianguru.com/tracking-mobile-with-phone-guardian.html
c. account.microsoft.com/devices
d. iCloud.com