Sample Question On Cyber Security
Sample Question On Cyber Security
2. I have a really strong password, so I should be able to use it for years. True or
False?
o A. True
o B. False
5. Which of the following usually observe each activity on the internet of the victim,
gather all information in the background, and send it to someone else?
a. Malware
b. Spyware
c. Adware
d. All of the above
6. _______ is a type of software designed to help the user's computer detect viruses
and avoid them.
a. Malware
b. Adware
c. Antivirus
d. Both B and C
7. It can be a software program or a hardware device that filters all data packets
coming through the internet, a network, etc. it is known as the_______:
a. Antivirus
b. Firewall
c. Cookies
d. Malware
a) Confidentiality
b) Integrity
c) Availability
d) All of the above
10. Governments hired some highly skilled hackers for providing cyber security for
the country or state. These types of hackers are termed as _______
a) Attack
b) Exploit
c) Vulnerability
d) Threat
12. In a phishing, attackers target the ________ technology to so social engineering.
a) Emails
b) WI-FI network
c) Operating systems
d) Surveillance camera
13. Physical hacking is not at all possible in hospitals, banks, private firms, and non-
profit organizations.
a) True
b) False
14. Stealing pen drives and DVDs after tailgating is an example of lack of _______
security.
a) network security
b) physical security
c) database security
d) wireless security
15. _____________ is a famous technological medium for the spread of malware, facing
problems of spam, & phishing attacks.
a) Cloud
b) Pen drive
c) Website
d) Email
a) Reverse Engineering
b) Malware Analysis
c) Social Engineering
d) Malware Writing
18. _____________ is the technique used for tricking users to disclose their username and
passwords through fake pages.
a) Social Engineering
b) Phishing
c) Cookie Stealing
d) Banner Grabbing
19. ____________ gets propagated through networks and technologies like SMS,
Bluetooth, wireless medium, USBs and infrared to affect mobile phones.
a) Worms
b) Antivirus
c) Malware
d) Multimedia files
20. App permissions can cause trouble as some apps may secretly access your
memory card or contact data.
a) True
b) False
21. Activate _____________ when you’re required it to use, otherwise turn it off for
security purpose.
a) Flash Light
b) App updates
c) Bluetooth
d) Rotation
1. As you are an employee of Islami Bank Bangladesh Limited, you use the official mail
regularly. You got an email from your Branch Manager asking for the Full Name of a
customer along with Credit Card number and Expiry date of the top client on urgent
basis else you will get a punishment memo. What will you do at first?
□ Reply to the text to confirm that you really need to renew your password.
□ Pick up the phone and call the Branch Manager, using a phone
number you know to be correct, to confirm that the request is real.
□ Click on the link. If it takes you to the website, then you’ll know it’s not a
scam.
3. A phishing attack can harm your personal computer only, but not your company’s
network.
□ True
□ False
4. Mr. H is your best friend. You recently mailed him your personal issues from your
official mail. After few days, Mr. H mailed you, “Please Open This Photo”. It was
highlighted with blue colored and underlined. When you clicked, you were directed
to a link named www.lbbleibs.com and it asks you to login.
a) You have provided your username and password. And it is saying wrong
password and directed to you to original link. Again, asks you to provide
username and password. After Providing exact same password you were able
to login. What happened actually?
b) You are working with eIBS and suddenly your account logged out. And when
you are trying to login with your username & password it was saying, “Your
password is wrong.” What shall you do first?
c) You have received Alert from IBBL Security Operation Center (iSOC) regarding
Malicious website visit i.e. www.lbbleibs.com. And warned you not to visit this
kind of websites that contains different types of malwares, adware,
ransomware etc. What will you do?
5. Suppose you are a Branch Manager of a Branch of Islami Bank Bangladesh Limited
and you got a mail like below:
CONGRATULATIONS...............................
We are delighted to inform you of your prize release on the 21st September, 2022
from the Central Bank Lottery programmer. Which is fully based on an electronic
selection of winners using their e-mail addresses, your name was attached to ticket
number 575061725 8056490902 serial number 6741137002 batch number
8056490902/188. You have won US$9,600,000.00(NINE MILLION SIX HUNDRED
THOUSAND DOLLARS). The winning price must be claim through www.claim-
winner-x.com
Yours Sincerely,
Mrs. LISA ADDISSON
(co-ordinator).
THANKS:
MANAGEMENT, AUSTRALIA LOTTO LOTTERY INC.
□ Phishing Mail
□ Official Mail
□ Instruction Circular Mail
□ Lottery Winning Mail
d) How you are going to introduce this kind of mail to your Team regarding this
kind of phishing mail?
6. You are a Cash Officer of a Branch of Islami Bank Bangladesh Limited. A Trainee
Assistant Officer (Cash) has joined recently and doesn’t have any CASM account. You
provided him your username and password of CASM. Your Password was abc123. A
client of your branch has deposited Tk. 100000 in his account whereas a wrong
entry was made in eIBS which was Tk. 10000. The entry was made from your
account but you didn’t do it and You don’t remember you have provided the
password to newly joined official.
□ You
□ Newly joined Official
□ Branch Manager
□ Cash In charge
□ Strong
□ Medium
□ Weak
c) You received an email from the Head of the Branch asking you for your
password. Since the email came from Branch Manager, it is okay to reply with
the information he requested.
□ True
□ False
□ Pass123
□ P@ss123
□ P@ss123#
□ 123pass
7. You searched on Google about how to be a smart banker from the PC under your
custodian. From the search result you have visited a site and it showed, “Click to
install this app to view How to be a smart Banker”
□ True
□ False
□ True
□ False
c) You visited YouTube to view How to be a smart Banker. But as per direction and
Guidelines of Honorable Managing Director & CEO, an instruction circular was
initiated to restrict all kind of social network websites, Online cloud storage and
YouTube. What will you do?
d) As per ICT Security Policy, in which section it was mentioned to not to use Social
Networks, Online cloud storage and Video sites during the office hours?
□ 5.3
□ 5.4
□ 5.2
□ 5.5
8. Recently, the Pay-scale of Islami Bank Bangladesh Limited was restructured and You
posted it on a group of Facebook as well as shared it to your friends.
a) You shall inform all your Facebook friends, Family regarding internal issues and
Daily transactions of the Bank on regular basis.
□ True
□ False
b) As per Digital Services Act, 2018, What types of Punishment you are going to face
for sharing intellectual and confidential data?
9. As per decision of the Management of the Bank, CITO & CISO has been appointed.
They will supervise and coordinate all of the Information Technology & Information
Security related issues.
□ True
□ False
11. Suppose you friend wants to buy a course from udemy.com. He doesn’t have any
International Credit Card. He asked you for your help. You own an International
Credit Card and endorsed your passport. And you are willing to help your friend.
a) You should take a picture of your card and send it to your friend and ask him to
process it.
□ True
□ False
b) You shouldn’t provide your Full name, Card Number, Expiry Date, CVV to your
friend
□ True
□ False
□ True
□ False
--------------------