Device Security

Cybersecurity Engineer Test

Device Security

Personal Cyber Security Quiz  (Computer security & Mobile security)

1 / 60

Category: Computer Security

1.Which of the following contains the “scanning process” while checking malware in windows?

 

2 / 60

Category: Computer Security

2.What are the steps to quarantine items using Group Policy?

3 / 60

Category: Computer Security

3.You shouldn’t back up all your documents and files before you start removing the malware infection.

 

4 / 60

Category: Computer Security

4.The steps to protect files from unauthorized access:

 

5 / 60

Category: Computer Security

5.What should you write on run to open the Local Group Policy Editor?

 

6 / 60

Category: Computer Security

6. BitLocker  is a free encryption tool.

 

7 / 60

Category: Computer Security

7.Restart by pressing ____ key over and over again until it takes you to the Safe Mode with Networking

 

8 / 60

Category: Computer Security

8.Which of the following can be used to open “Settings” in windows 10?(Choose all applicable answers)

 

9 / 60

Category: Computer Security

9.Which for good practices while securing Windows 10?(Choose all applicable answers)

 

10 / 60

Category: Computer Security

10.If you turn on the device encryption,it will save you from Ransomware.

 

11 / 60

Category: Computer Security

11.Which is the shortcut to open the Run command?

 

12 / 60

Category: Computer Security

12.From “Safe Mode” you can download necessary software such as antivirus, firewall etc.

 

13 / 60

Category: Computer Security

13.Which OS has the “Last Known Good Configuration” boot option?(Choose all applicable answers)

 

14 / 60

Category: Computer Security

14.Which of the following is the Boot Log File?

 

15 / 60

Category: Computer Security

15.Windows defender works better than any other third party endpoint solution.

 

16 / 60

Category: Computer Security

16.If CleanMyMac X doesn’t report a clean bill of health,what should you press?

 

17 / 60

Category: Computer Security

17.Which one should you open first to turn on the firewall on Mac OS?

 

18 / 60

Category: Computer Security

18.Turning on FileVault will disable automatic login on Mac OS.

 

19 / 60

Category: Computer Security

19.What are the steps of disabling Spotlight Suggestions?

20 / 60

Category: Computer Security

20.Which is the shortcut of turning on private browsing in Safari?

 

21 / 60

Category: Computer Security

21. Restarting the computer by pressing the Power button along with the keyboard command Shift-Control-Option is used to “Check the disk for errors” on Mac OS.

 

22 / 60

Category: Computer Security

22.Which of the following are Common Malware Symptoms seen on a Mac OS? (Choose all applicable answers)

 

23 / 60

Category: Computer Security

23.To update system software on Mac OS:

 

24 / 60

Category: Computer Security

24.Which tab contains "Login Items" in Mac OS’s system preferences?

25 / 60

Category: Computer Security

25.What Are the Most Recent Mac Malware Threats?(Choose all applicable answers)

 

26 / 60

Category: Computer Security

26.Immediately shutting down Mac and restoring from a recent backup is good practice while fighting against malware.

 

27 / 60

Category: Computer Security

27.Which of the following aren’t  Mac’s built-in security features? (Choose all applicable answers)

 

28 / 60

Category: Computer Security

28.To check the disk for errors on Mac:

 

29 / 60

Category: Computer Security

29.To To reset the NVRAM on Mac:

 

30 / 60

Category: Computer Security

30.First Aid is used to _____ on Mac OS.

 

31 / 60

Category: Computer Security

31.To secure SSH on Linux:(Choose all applicable answers)

 

32 / 60

Category: Computer Security

32. To enable online and ssh access on Linux,you should run:(Choose all applicable answers)

 

33 / 60

Category: Computer Security

33.Which of the following can help to create a strong password?

 

34 / 60

Category: Computer Security

34.Which of the following isn’t a good practice for Linux security & privacy settings?

35 / 60

Category: Computer Security

35.To find the scheduled tasks on Linux:

 

36 / 60

Category: Computer Security

36.  Using  the NIS service for centralized authentication in Linux is a good practice.

 

37 / 60

Category: Computer Security

37.Which of the following can be used to monitor suspicious log messages on Linux? (Choose all applicable answers)

 

38 / 60

Category: Computer Security

38. “netstat -nap” command is used to display all the listening ports in Linux.

 

39 / 60

Category: Computer Security

39. Why is “fail2ban” used in Linux?

 

40 / 60

Category: Computer Security

40. To set up password rules in Linux:

 

41 / 60

Category: Mobile Security Quiz

1.Which one is not a checklist for security and privacy for iOS security?

 

42 / 60

Category: Mobile Security Quiz

2.How to set up a passcode on an iOS device?

 

43 / 60

Category: Mobile Security Quiz

3.How to Enable “Erase Data” to delete data after 10 failed passcode attempts in IOS devices:

44 / 60

Category: Mobile Security Quiz

4.Steps to disable notifications in the lock screen for sensitive apps in IOS devices:

 

45 / 60

Category: Mobile Security Quiz

5.Steps to Turn off “Share My Location.” in IOS devices:

 

46 / 60

Category: Mobile Security Quiz

6.Steps to turn off location services for the apps that do not require it in iOS devices:

 

47 / 60

Category: Mobile Security Quiz

7.How to turn off access to sensitive data for apps that do not need it in IOS devices:(Choose all applicable answers)

 

48 / 60

Category: Mobile Security Quiz

8.Steps to review the installed apps in IOS devices:(Choose all applicable answers)

 

49 / 60

Category: Mobile Security Quiz

9.To turn off read receipts so people are not notified when their message is seen in IOS devices is: “Settings > Messages > Send Read Receipts”

 

50 / 60

Category: Mobile Security Quiz

10.Steps to reset advertising identifier from time to time in IOS devices:

 

51 / 60

Category: Mobile Security Quiz

11. Process to turn on “Limit ad tracking” in iOS devices is:

 

52 / 60

Category: Mobile Security Quiz

12.Steps to make your iPhone lockout sooner:

 

53 / 60

Category: Mobile Security Quiz

13.Process to enable 2-factor authentication in iOS devices:

 

54 / 60

Category: Mobile Security Quiz

14.Disabling SIRI in IOS: Settings > SIRI and Search > Turn off “Allow SIRI when locked”.

 

55 / 60

Category: Mobile Security Quiz

15.Steps to Turn on "find my iPhone":

 

56 / 60

Category: Mobile Security Quiz

16.Which one is privacy focused web browser?(Choose all applicable answers)

 

57 / 60

Category: Mobile Security Quiz

17.Turning off "auto-fill" is one of the best security practices.

 

58 / 60

Category: Mobile Security Quiz

18.Turning on "location sharing" in images on the iPhone is one of the best security practices.

 

59 / 60

Category: Mobile Security Quiz

19.Steps to disabling photo stream:

 

60 / 60

Category: Mobile Security Quiz

20.Steps to turn off backup images:

 

0%