HOUSIE Game {Answers}

Congratulation you are going to WIN the game . . . #HOUSIE

If you want to help others then comment down new questions with the answers.

Thank you in advance : )

I track your activity on the website and build up a profile of your browsing history to give you a good user experience. I cannot infect your computer but can pose a thread to your privacy. Who am I?

  • COOKIE

If you use a Digital signature, you cannot deny having done a communication. This property is called ____

  • NON-REPUDIATION

Source code developed as part of the delivery to the customer is the IPR of ____

  • CUSTOMER

A hacker manages to exploit a vulnerability before software developers can find a fix. This is known as _____ attack

  • ZERO DAY

A protocol used to securely access a computer

  • SSH

A type of phishing attack, just that SMS is used as a medium

  • SMISHING

A security measure to distinguish human from machine input

  • CAPTCHA

____ is used to distract attackers to prevent them from attacking actual production systems

  • HONEYPOT

Any paper information that is no longer required should be destroyed using a _____

  • SHREDDER

An application from Business Continuity Management System in TCS

  • RPLANNER

I’m a form of advanced biometric authentication

  • VEIN SCAN

TCS ISO 22301:2019 certification is for ____ system

  • BCM

You are ____ for any activity performed from your login credentials.

  • ACCOUNTABLE

Theft of software through illegal copying of genuine/licensed programs causing loss to business

  • PIRACY

An encryption scheme involving a public key for encryption and a private key for decryption

  • ASYMMETRIC

A type of exercise where team members discuss a simulated emergency situation in an informal manner

  • TABLE TOP TEST

A vulnerable protocol used for remote connection

  • TELNET

Downloading images from the internet to use in your presentation can lead to ____

  • COPYRIGHT VIOLATION

I have not kidnapped you but am extorting money not letting you see your data till you pay me. Who am I?

  • RANSOMWARE

A key role for coordinating business continuity and crisis management-related activities

  • CML

This is a secured way to transfer files over the network

  • SFTP

____ is a type of malicious software that forces your computer to automatically display or download advertisements

  • ADWARE

TCS’ own enterprises platform to manage associate’s onboarding and access

  • RIGHTS

A type of cyber-attack that involves impersonation

  • SPOOFING

Helps in checking data integrity

  • CHECKSUM

A person gains logical or physical access without permission

  • UNAUTHORISED ACCESS

The best control to avoid social engineering attacks is ____

  • AWARENESS

TCS’ own crisis communication tool for reaching out to a large number of associated via SMS, UxApp, Email etc

  • MASSCOM

I’m a software designed to infiltrate and damage computer systems

  • MALWARE

Access must be given based on the principle of ____

  • LEAST PRIVILEGE

Taking backup of data on regular basis ensures ____ of data during crisis

  • AVAILABILITY

This is the key to enter into your system. It must be complex but you should memorize it and never write or store it in plain text. It is better than a Password

  • PASSPHRASE

What is a person doing if following you into an access-restricted area without using his / her own access card?

  • TAILGATING

Thank God! I have a ____ so I could easily restore my lost data

  • BACKUP

I’m a content filtering tool that helps prevent access to malicious/restricted websites

  • ZSCALER

One of the recommended practices to protect web application from external attacks

  • INPUT VALIDATION

A device with south and north pole, used for destroying data on hard disk such that the data ceases to exist

  • DEGAUSSER

An agreement between two parties exchanging information to protect confidentiality of the information – an acronym

  • NDA

This occurs when incoming data volume exceeds the storage capacity of the memory

  • BUFFER OVERFLOW

You would seek its help in the event of a crisis to reach out to your colleagues

  • CALL TREE

____ helps to prevent unauthorized changes to data or information

  • ACCESS CONTROL

Doing on online transactions? You must check for ____ at the beginning of the URL

  • HTTPS

Never reply to ____ mails this only confirms to the sender the validity of the recipient’s email address

  • SPAM

A software designed to detect and destroy malware

  • ANTI VIRUS

____ is a cloud based solution from Microsoft that helps to classify and protect files

  • AIP

Interception of communication between two parties by a malicious third party is known as ____

  • EAVESDROPPING

A collection of all vulnerable points by which an attacker can gain entry into the target system

  • ATTACK VECTOR

It’s the possibility of something going wrong. In our day to day life too, we evaluate this before taking any decision

  • RISK

An alternate site that is fully equipped and ready to resume operations in case of a disaster

  • HOT SITE

As per IQMS, Quarterly financial results until announced should be classified as ____

  • RESTRICTED

Technology that examines network traffic flows to detect and prevent vulnerability exploits

  • IPS

One of the recommended practices to protect web application from external attacks

  • INPUT VALIDATION

____ is a simulated cyber attack to check for exploitable vulnerabilities in an application

  • PENETRATION TESTING

This is what your system does when you enter user ID and password

  • AUTHENTICATE

I’m a control to prevent confidential information from leaving organization’s boundaries

  • DLP

A very popular Ransomware

  • LOCKBIT

I’m a type of malware that can replicate itself to spread and infiltrate other computers

  • WORM

A type of drill whereby team rehearses all of the actions they would perform in the event of a real incident

  • SIMULATION

Share on:
Online Certification Guide

About Author

Hey there, its OnlineCertificationGuide here to help you out in your Journey in the study. So my friend share the site with your friends in case I am helpful to you.

1 thought on “HOUSIE Game {Answers}”

  1. This site is an excellent resource for anyone interested in learning about a variety of topics. Thanks for all that you do.

Comments are closed.