Congratulation you are going to WIN the game . . . #HOUSIE
If you want to help others then comment down new questions with the answers.
Thank you in advance : )
I track your activity on the website and build up a profile of your browsing history to give you a good user experience. I cannot infect your computer but can pose a thread to your privacy. Who am I?
- COOKIE
If you use a Digital signature, you cannot deny having done a communication. This property is called ____
- NON-REPUDIATION
Source code developed as part of the delivery to the customer is the IPR of ____
- CUSTOMER
A hacker manages to exploit a vulnerability before software developers can find a fix. This is known as _____ attack
- ZERO DAY
A protocol used to securely access a computer
- SSH
A type of phishing attack, just that SMS is used as a medium
- SMISHING
A security measure to distinguish human from machine input
- CAPTCHA
____ is used to distract attackers to prevent them from attacking actual production systems
- HONEYPOT
Any paper information that is no longer required should be destroyed using a _____
- SHREDDER
An application from Business Continuity Management System in TCS
- RPLANNER
I’m a form of advanced biometric authentication
- VEIN SCAN
TCS ISO 22301:2019 certification is for ____ system
- BCM
You are ____ for any activity performed from your login credentials.
- ACCOUNTABLE
Theft of software through illegal copying of genuine/licensed programs causing loss to business
- PIRACY
An encryption scheme involving a public key for encryption and a private key for decryption
- ASYMMETRIC
A type of exercise where team members discuss a simulated emergency situation in an informal manner
- TABLE TOP TEST
A vulnerable protocol used for remote connection
- TELNET
Downloading images from the internet to use in your presentation can lead to ____
- COPYRIGHT VIOLATION
I have not kidnapped you but am extorting money not letting you see your data till you pay me. Who am I?
- RANSOMWARE
A key role for coordinating business continuity and crisis management-related activities
- CML
This is a secured way to transfer files over the network
- SFTP
____ is a type of malicious software that forces your computer to automatically display or download advertisements
- ADWARE
TCS’ own enterprises platform to manage associate’s onboarding and access
- RIGHTS
A type of cyber-attack that involves impersonation
- SPOOFING
Helps in checking data integrity
- CHECKSUM
A person gains logical or physical access without permission
- UNAUTHORISED ACCESS
The best control to avoid social engineering attacks is ____
- AWARENESS
TCS’ own crisis communication tool for reaching out to a large number of associated via SMS, UxApp, Email etc
- MASSCOM
I’m a software designed to infiltrate and damage computer systems
- MALWARE
Access must be given based on the principle of ____
- LEAST PRIVILEGE
Taking backup of data on regular basis ensures ____ of data during crisis
- AVAILABILITY
This is the key to enter into your system. It must be complex but you should memorize it and never write or store it in plain text. It is better than a Password
- PASSPHRASE
What is a person doing if following you into an access-restricted area without using his / her own access card?
- TAILGATING
Thank God! I have a ____ so I could easily restore my lost data
- BACKUP
I’m a content filtering tool that helps prevent access to malicious/restricted websites
- ZSCALER
One of the recommended practices to protect web application from external attacks
- INPUT VALIDATION
A device with south and north pole, used for destroying data on hard disk such that the data ceases to exist
- DEGAUSSER
An agreement between two parties exchanging information to protect confidentiality of the information – an acronym
- NDA
This occurs when incoming data volume exceeds the storage capacity of the memory
- BUFFER OVERFLOW
You would seek its help in the event of a crisis to reach out to your colleagues
- CALL TREE
____ helps to prevent unauthorized changes to data or information
- ACCESS CONTROL
Doing on online transactions? You must check for ____ at the beginning of the URL
- HTTPS
Never reply to ____ mails this only confirms to the sender the validity of the recipient’s email address
- SPAM
A software designed to detect and destroy malware
- ANTI VIRUS
____ is a cloud based solution from Microsoft that helps to classify and protect files
- AIP
Interception of communication between two parties by a malicious third party is known as ____
- EAVESDROPPING
A collection of all vulnerable points by which an attacker can gain entry into the target system
- ATTACK VECTOR
It’s the possibility of something going wrong. In our day to day life too, we evaluate this before taking any decision
- RISK
An alternate site that is fully equipped and ready to resume operations in case of a disaster
- HOT SITE
As per IQMS, Quarterly financial results until announced should be classified as ____
- RESTRICTED
Technology that examines network traffic flows to detect and prevent vulnerability exploits
- IPS
One of the recommended practices to protect web application from external attacks
- INPUT VALIDATION
____ is a simulated cyber attack to check for exploitable vulnerabilities in an application
- PENETRATION TESTING
This is what your system does when you enter user ID and password
- AUTHENTICATE
I’m a control to prevent confidential information from leaving organization’s boundaries
- DLP
A very popular Ransomware
- LOCKBIT
I’m a type of malware that can replicate itself to spread and infiltrate other computers
- WORM
A type of drill whereby team rehearses all of the actions they would perform in the event of a real incident
- SIMULATION
This site is an excellent resource for anyone interested in learning about a variety of topics. Thanks for all that you do.