Sei sulla pagina 1di 5

TUGAS BESAR 1 DASAR KEAMANAN KOMPUTER

RABU, 19.30-22.00 (WARUNG BUNCIT) DOSEN: NUR ANI, ST, MMSI

NAMA MHS: ANGGANA FAJAR SUTEJA NIM MHS: 41519120072

Write your answers in the table provided below

1. What does a lock icon symbolize besides a website name?


a) The website needs a password to be accessed
b) The website cannot be accessed without the site admin’s permission
c) The website is a secure website
d) The website is not accessible at the moment

2. Horace is a 64 year-old man who worked as an accountant for SN Associates before his
retirement. The company gifted him a laptop at the time of his retirement. Since Horace was not
a technically savvy person, he did not install any applications on his laptop, and only used it for
checking his email and playing poker online. After some time, Horace’s laptop started giving him
problems. It crashed frequently, often displayed the Blue Screen of Death (BSOD), and
unwanted windows kept popping up whenever he went online. When Horace took his laptop to
the service center, he was told that his laptop was infected with malware.
Which software should Horace have installed to prevent malware infection in his laptop?
a) Adobe Reader c) One Drive
b) Antivirus software d) Skype

3. Ruth Cole is a sales manager and travels extensively on business. She regularly updates and
stores clients’ data on a remote data storage device via the Internet, so that in case she loses
her laptop or it crashes for some reason, she does not lose the data which is essential to
carrying out her work.
Which type of data backup is Emma using to carry out her daily work?
a) Differential backup c) Online data backup
b) Incremental backup d) Full system backup

4. Which of the following is the strongest password?


a) Domike* c) donnamike92
b) Donna1992 d) Pa#72tLe

5. Luke works as an analyst for AS Pvt. Ltd. His job there is to analyze statistics and records
obtained from people to improve the sales of the company. However, recently the statistics and
records given to him have been incorrect, thus leading to gross miscalculations and wrong
predictions on his part. Which of the terms listed below, best describes these statistics and
records that are incorrect?
a) Information c) Archives
b) Data d) Indicators
6. Duke is taking some of the best pictures he has yet as an amateur photographer in a pen drive
to get his work assessed by an expert. On the subway an unknown person picks his pocket.
Along with his wallet Duke also lost the pen drive with his pictures. Since he had not made any
more copies of those pictures, he lost them forever.
What type of data loss is this?
a) Hardware theft c) Natural disaster
b) Malware attack d) Software theft

7. Which of the following software programs runs on the internet and allows users to find, access,
and display web pages?
a) Email c) Extensions
b) Web browsers d) Search engine

8. Infra Tech Inc. is an international IT company with offices in Dubai, Singapore, and Australia. To
have continuity of business practice, it is imperative that all the branch offices be able to
communicate amongst themselves.
Which of the following network systems would be suitable for data communication between the
employees of all branches of Infra Tech Inc.?
a) Ethernet c) Virtual Private Network?
b) Local Area Network d) Wide Area Network

9. Which of the following terms refers to the process that ensures accuracy of the sender and
receiver of a message?
a) Nonrepudiation c) Authenticity
b) Data d) Availability

10. Which of the following terms refers to a collection of information that defines or describes the
user and his or her interests?
a) Facebook group c) Timeline
b) Account settings d) Profile

11. Sam uses his work laptop to watch pirated movies at home sometimes. When he tried to watch
the latest movie he downloaded, the movie file did not play even after trying on several
different players. Within a day of this, Sam noticed that many of his files were vanishing one
after the other from his laptop even though neither he nor anyone else deleted them. The
network administrator of his company, after taking a look at his computer told him that the
movie files, which did not play, definitely had something to do with this peculiar behavior.
What type of data loss could this be?
a) Software failure c) Human error
b) Computer virus d) Natural disaster

12. Alex, the coach of Manchester United, called up Wayne, the captain of the team, to discuss the
tactics they would employ in the upcoming Champions League Final. The following day, Alex
received an email with the transcript of the conversation he had with Wayne. The sender of the
email threatened to make Alex’s tactics public, if he did not pay him $5000.
Which form of mobile device attack was Alex a victim of?
a) Social engineering c) Eavesdropping
b) Man in the middle attack d) Phishing
13. Raymond received an email from an official claiming to be from his bank. The email requested
Raymond to send his personal details since the customer database of the bank was being
updated. Upon confirmation from the bank, Raymond was told that the bank had not sent any
emails asking for the personal details of their customers.
Which cyber-attack would Raymond have been a victim of if he had replied to the email?
a) Man in the middle attack c) Eavesdropping
b) War driver d) Phishing

14. Ellie, an 18 year-old student, shares her Windows computer with her younger brother, Adam.
Adam is very mischievous and whenever he is on the computer, he ruins Ellie’s college
assignments. Ellie, who is fed up of this decides to encrypt the drive that contains her
assignments. She uses inbuilt Windows software to encrypt the drive so that Adam cannot
access the drive.
Which software did Ellie use?
a) BitLocker c) Skype
b) Adobe d) SPAMfighter

15. Fred, a 14 year-old boy, is an only child. Fred loves spending time on his Mac OS X browsing the
internet. When his parents are not at home, he spends hours at a stretch on the computer.
Once, when Fred’s parents come home late from work and find him on the Mac, they decided to
limit his computer time. Enabling an inbuilt feature in the Mac, Fred’s parents limit his computer
time to two hours daily. Which MAC OS X feature did Fred’s parents enable?
a) FileVault c) Jump lists
b) Parental control d) UAC slider bar

16. Which of the following helps to backup data on a Mac?


a) Extensions c) Internet Accounts
b) App Store d) Time Machine

17. Lucy, a 55 year-old woman, was not a technically savvy person. She did not install or enable any
applications on her computer, and only used it for looking up recipes and knitting patterns. After
some time, Lucy’s computer started giving her problems. It often displayed the Blue Screen of
Death (BSOD) and unwanted windows kept popping up whenever she went online. When a
computer technician checked Lucy’s computer, it was discovered that her computer was
infected with malware.
Which inbuilt Windows software should Lucy have enabled to prevent malware infection in her
computer?
a) Task manager c) Simple file sharing
b) Jump lists d) Windows Defender

18. Sally is a 16-year-old high school student who is extremely attached to her laptop. She uses it to
download and watch episodes of her favorite sitcom. While watching one of the episodes, her
laptop switched off automatically a couple of times. Suspecting a malware infection, she
opened the antivirus software on her laptop and chose a technique, which examined all files on
the memory and hard disk in order to identify and locate the malware.
Which antivirus technique did Sally employ?
a) Bookmarks method b) Integrity checking
c) Heuristics analysis d) Scanning

19. Which of the following terms refers to software that attackers create to install on a victim’s
computer in order to compromise its security?
a) Lockbin c) Dropbox
b) Malware d) Bitlocker

20. Amy received an email from an official claiming to be from ABC Parcel Services. The email asked
her to collect a gift parcel sent by her friend three weeks ago. The service claimed that they
were unable to deliver the parcel to Amy, as the address provided was wrong. The service asked
her to print out the attached invoice copy, fill it, and collect the package from the branch office
located in her city.
Which type of email security threat could Amy have faced, if she clicked or downloaded the
attachment?
a) Phishing c) Malicious user redirection
b) Hoax mail d) Malicious email attachment

21. Daniel, a bank officer, communicates with his clients through emails on a daily basis. Recently,
he noticed that his Gmail inbox was filled with unsolicited emails. The cluttered inbox annoyed
him, as it was difficult to filter the important emails. Hence, he decided to find a solution for it.
Upon inquiry, a service provider told him that he could use software which automatically filters
out the unsolicited emails. This software would not only protect his Gmail account, but also
protect all the email accounts configured on his email client.
Which of the following tools did Daniel probably enquire about?
a) Norton c) Avast Pro
b) Kaspersky d) SPAMfighter

22. Isaac is transferring all the data from his computer to an external drive as he wants to format his
laptop. While moving the data, he accidentally hits delete instead of cut on one of the files and
without realizing, hit the enter key when the computer prompted to confirm his action. As the
file was a huge one, it did not go to the recycle bin and got permanently deleted.
What type of data loss is this?
a) Software failure c) Human error
b) Computer virus d) Hardware theft

23. Hermione is a 21 year-old college student. She loves spending time on Facebook. However, with
her final exams approaching, she feels that spending time on Facebook will harm her exam
results. Hence, she enables a particular Facebook feature, with the help of which, she will not
get any emails or notifications from Facebook.
Which Facebook feature did Hermione use?
a) Who can look me up c) Login alerts
b) Deactivate account d) Where you’re logged in

24. Certain software applications add or modify a particular feature in a browser. A few versions
allow users to block ads, watch online videos, or IM with friends.
What is this application called?
a) ActiveX c) Cookies
b) Extensions d) Java
25. Samuel, a network admin in an IT firm, has just discovered a phishing site known for targeting
corporate entities. Several employees have received emails with the domain name, which is the
same as that of this site. In order to prevent the company’s network from being corrupted,
Samuel decides to block all incoming and outgoing traffic from that site.
Which of the following defense mechanisms can Samuel use to implement this?
a) Encryption c) Firewall
b) Virus d) Disk encryption

FILL THE ANSWER IN THIS TABLE WITH CROSS (X)

NO 1 2 3 4 5 6 7 8 9 10
A X X
B X X X
C X X
D X X X

NO 11 12 13 14 15 16 17 18 19 20
A X
B X X X X
C
D X X X X X

NO 21 22 23 24 25
A
B X X
C X X X
D

Potrebbero piacerti anche