You are on page 1of 6

Soal

1.Imagine getting a letter from the Inland Revenue Authority of Singapore (IRAS)
demanding that you pay $5,700 in taxes. This is what happened to Rick. He received
a letter informing him that he owed the government unpaid income tax on wages he
never earned. The IRAS letter said that Rick had worked at several places. However,
Rick is only 15 years old and his only job was working at his uncle�s grocery store
during the summer. He had never even visited some of the places where the letter
said he worked. Rick was not sure what to do next. After all, he has never even
had a �real� job like those listed in the letter.
What is going on in this scenario?
Social engineering
Identity Theft
Nigerian scam
Phishing

2. Which of the following terms refers to malicious software that is specifically


built to target mobile phones and smartphones systems?
Unmanaged applications
Broken cryptography
Mobile malware
Phishing

3.Harold, an associate at AQ Corporation, received a phone call from a person


claiming to be Bob from the IT department. Bob told Harold that he had noticed that
Harold�s computer was running slow, and could help him fix it. Harold, not having
much knowledge regarding computers, readily agreed. Following Bob�s instructions,
Harold typed in some commands on his computer, and gave remote access to Bob to
have his computer fixed. Later on, Harold noticed that confidential information
concerning his clients was missing from his computer.
Which attack was Harold a victim of?
Evil twin
War driver
Bluesnarfing
Social engineering

4. Which of the following fundamental concepts of security refers to an action


taken in advance to protect the system against threats or dangers?
Reaction
Maintenance
Nonrepudiation
Precaution

5. Hermione is a 21 year-old college student. She loves spending time on Facebook.


However, with her final exams approaching, she feels that spending time on Facebook
will harm her exam results. Hence, she enables a particular Facebook feature, with
the help of which, she will not get any emails or notifications from Facebook.
Which Facebook feature did Hermione use?
Who can look me up
Login alerts
Deactivate account
Where you�re logged in

6. Susan downloaded a software from the Internet and installed it on her computer
for watching movies online. After installing the software, she noticed that her PC
was slowing down and was taking more time to open webpages.
What could Susan do to solve this problem?
Stop using wireless internet connection
Start using Ethernet
Choose a suitable encryption method
Install a latest antivirus software and scan her computer

7. Alex, the coach of Manchester United, called up Wayne, the captain of the team,
to discuss the tactics they would employ in the upcoming Champions League Final.
The following day, Alex received an email with the transcript of the conversation
he had with Wayne. The sender of the email threatened to make Alex�s tactics
public, if he did not pay him $5000.
Which form of mobile device attack was Alex a victim of?
Social engineering
Man in the middle attack
Phishing
Eavesdropping

8. Which of the following antivirus techniques refers to the process of comparing


the current state of stored programs to a previously recorded state, which is known
to be free of malware?
Scanning
Bookmarks method
Heuristics analysis
Integrity checking

9. InfraTech Inc. is an international IT company with offices in Dubai, Singapore,


and Australia. To have continuity of business practice, it is imperative that all
the branch offices be able to communicate amongst themselves.
Which of the following network systems would be suitable for data communication
between the employees of all branches of InfraTech Inc.?
Ethernet
Local Area Network
Wide Area Network
Virtual Private Network

10. Susan, a 15-year-old girl, loves spending her free time baking and cycling.
However, recently she has been spending all of her free time glued to the computer.
She shows no interest in her hobbies anymore and looks depressed most of the time.
Her parents also noticed that whenever they enter her room, she quickly changes the
computer screen. Understandably, Susan�s parents are worried about her.
What could be the reason for her behavior?
Too much pressure at school
Victim of online child abuse
Social engineering
Unsolicited emails

11. Tom, a 14 year-old boy has been chatting online with Adam, whom Tom assumes is
14 years old as well. Over the months, they built up a great �online� friendship,
playing online games, checking out EDM websites, continuing with their friendly
rivalry over football, and just talking about �guy� stuff. When Adam invited Tom
over to meet him, Tom was obviously excited. However, when Tom met Adam, he was
shocked, as Adam turned out to be a 35 years old man. Despite this shock, Tom
entered Adam�s house, as he trusted him. Tom was having a great time playing PS3
with Adam, until the time Adam touched him inappropriately. Tom ran away from
Adam�s house and did not know what to do.
Which form of cyber-attack was Tom a victim of?
Phishing
Pornography
Social engineering
Grooming

12. Andrew lost his iPhone on the way home from college. He anxiously wanted to
recover it, as it was a gift from his late grandfather. The iPhone also contained
pictures that he had taken for a national photography contest.
Using which iOS feature, can Andrew locate his phone?
iCloud backup
SIM lock
Find my iPhone
System updates

13. John is an 18 year-old college-going student. He loves to read books and listen
to music on his laptop. He regularly downloads e-books and music from the internet.
Lately, whenever John has been spending time on his laptop, the laptop begins
displaying the infamous Blue Screen of Death (BSOD). Upon taking his laptop to the
service center, John was told that his laptop was infected with malware.
Which symptom of malware infection is John�s laptop displaying?
Slow system
Unexpected crashes
Laptop screen malfunction
Hard drive malfunction

14. Fred, a 14 year-old boy, is an only child. Fred loves spending time on his Mac
OS X browsing the internet. When his parents are not at home, he spends hours at a
stretch on the computer. Once, when Fred�s parents come home late from work and
find him on the Mac, they decided to limit his computer time. Enabling an inbuilt
feature in the Mac, Fred�s parents limit his computer time to two hours daily.
Which MAC OS X feature did Fred�s parents enable?
UAC slider bar
Parental control
Jump lists
FileVault

15. Daniel, a bank officer, communicates with his clients through emails on a daily
basis. Recently, he noticed that his Gmail inbox was filled with unsolicited
emails. The cluttered inbox annoyed him, as it was difficult to filter the
important emails. Hence, he decided to find a solution for it. Upon inquiry, a
service provider told him that he could use software which automatically filters
out the unsolicited emails. This software would not only protect his Gmail account,
but also protect all the email accounts configured on his email client.
Which of the following tools did Daniel probably enquire about?

SPAMfighter
Kaspersky
Avast Pro
Norton

16. Which of the following terms refers to a collection of information that defines
or describes the user and his or her interests?
Facebook group
Profile
Account settings
Timeline

17.Which of the following websites can Windows Phone users use to locate their
stolen smartphone?
iCloud.com
android.com/devicemanager
account.microsoft.com/devices
http://www.symbianguru.com/tracking-mobile-with-phone-guardian.html

18. Ellie, an 18 year-old student, shares her Windows computer with her younger
brother, Adam. Adam is very mischievous and whenever he is on the computer, he
ruins Ellie�s college assignments. Ellie, who is fed up of this decides to encrypt
the drive that contains her assignments. She uses inbuilt Windows software to
encrypt the drive so that Adam cannot access the drive.
Which software did Ellie use?
Adobe
SPAMfighter
Skype
BitLocker

19. What does a lock icon symbolize besides a website name?


The website needs a password to be accessed
The website cannot be accessed without the site admin�s permission
The website is a secure website
The website is not accessible at the moment

20. Which of the following terms refers to the process of protecting information,
and the infrastructure that stores it?
Maintenance
Availability
Keystroke logging
Data security

21. Ruth Cole is a sales manager and travels extensively on business. She regularly
updates and stores clients� data on a remote data storage device via the Internet,
so that in case she loses her laptop or it crashes for some reason, she does not
lose the data which is essential to carrying out her work.
Which type of data backup is Emma using to carry out her daily work?
Online data backup
Full system backup
Differential backup
Incremental backup

22. Samuel, a network admin in an IT firm, has just discovered a phishing site
known for targeting corporate entities. Several employees have received emails with
the domain name, which is the same as that of this site. In order to prevent the
company�s network from being corrupted, Samuel decides to block all incoming and
outgoing traffic from that site.
Which of the following defense mechanisms can Samuel use to implement this?
Encryption
Firewall
Disk encryption
Virus

23. Sally is a 16-year-old high school student who is extremely attached to her
laptop. She uses it to download and watch episodes of her favorite sitcom. While
watching one of the episodes, her laptop switched off automatically a couple of
times. Suspecting a malware infection, she opened the antivirus software on her
laptop and chose a technique, which examined all files on the memory and hard disk
in order to identify and locate the malware.
Which antivirus technique did Sally employ?
Bookmarks method
Heuristics analysis
Integrity checking
Scanning

24. ABC Info Ltd. has a part of its business already on a cloud computing platform.
However, its new product suite would need a cloud service which runs on a totally
different technology. The company should be able to make its legacy products and
new products communicate with each other as the new products are just an upgrade of
the old ones and much of the required data still resides on the old cloud.
Which of the following cloud computing platforms will be suitable for ABC Info�s
future needs?
Hybrid cloud
Public cloud
Community cloud
Private cloud

http://www.cloudindonesia.or.id/catatan-kultwit-2-public-private-hybrid-dan-
community-cloud.html

25. Raymond received an email from an official claiming to be from his bank. The
email requested Raymond to send his personal details since the customer database of
the bank was being updated. Upon confirmation from the bank, Raymond was told that
the bank had not sent any emails asking for the personal details of their
customers.
Which cyber-attack would Raymond have been a victim of if he had replied to the
email?
War driver
Man in the middle attack
Eavesdropping
Phishing

26. Which of the following is the strongest password?


Donna1992
donnamike92
Domike*
Pa#72tLe

27. Luke works as an analyst for AS Pvt. Ltd. His job there is to analyze
statistics and records obtained from people to improve the sales of the company.
However, recently the statistics and records given to him have been incorrect, thus
leading to gross miscalculations and wrong predictions on his part. Which of the
terms listed below, best describes these statistics and records that are incorrect?
Information
Indicators
Data
Archives

28. Duke is taking some of the best pictures he has yet as an amateur photographer
in a pen drive to get his work assessed by an expert. On the subway an unknown
person picks his pocket. Along with his wallet Duke also lost the pen drive with
his pictures. Since he had not made any more copies of those pictures, he lost them
forever.
What type of data loss is this?
Natural disaster
Software theft
Hardware theft
Malware attack

29. XYZ Infra Solutions, a startup company is looking for a cloud service provider
who can provide virtual machines, virtual local area network, customized software
applications, on demand storage, IP addresses, and firewalls to meet its business
needs.
Which of the following cloud computing services can meet the business needs of the
company?
Platform as a Service
Infrastructure as a Service
Application as a Service
Software as a Service

30. A new online service allows people living with roommates to feed in all their
house hold expenses in its �share calculator� program. The program then calculates
how much each person is supposed to pay and sends a detailed report to all those
who are listed as roommates for that particular transaction.
The above mentioned service is an example of which of the following?
Infrastructure as a Service
Platform as a Service
Software as a Service
Network as a Service

31. A newly established ITES company plans to launch a website which enables its
users to share pictures and videos with each other. Apart from this, users can also
comment on these pictures and share them further.
Under which of the following cloud categories will the company�s product come?
Private Cloud
Hybrid Cloud
Community cloud
Public Cloud

32.

You might also like