4 September 2020

Fortinet NSE 1 Certifications Answer - Data Security Quiz


Question 1: Which definition best describes personally identifiable information (PII)?

 

·         Personal preferences, such as favourite setting in applications

·         Any information that someone can use to identify you

·         A means of identifying that author of information

·         A government-issued number that is used to identify a citizen, mostly for tax purposes

 

 

Question 2: In the context of cybersecurity, which definition best describes social engineering?

 

·         An exploitation of a relationship of interaction to trick a person into divulging sensitive or personal information

·         A movement by which engineers are coerced into writing code a specific way

·         A group of engineers who come together to talk code

·         A cooperative method used to develop and improve code

 

Question 3: Identify the best description of vishing

 

·         A phone exploitation that often relies on caller ID to appear legitimate

·         A fraudulent text-based message that attempts to trick someone into divulging information

·         A fraudulent email that pretends to be from a reputable source that targets a group of people for purposes of disclosing information

·         The process of introducing malware by some security loophole in an application

 

Question 4: Which description best identifies the term malicious code?

 

·         A program that has flaws in it

·         Code that does not behave in the manner intended by its author

·         An unwanted file or program that can cause harm to, or compromise data on, a computer

·         Untested code that a vendor releases to the public

 

Question 5: Which description best explains cybersecurity?

 

·         Protecting networks, devices, and data from unauthorized access

·         Securing cyber advantages over a business competitor

·         Strategic Defence Initiative (SDI)

·         Home and business security, using motion sensors and monitored by a security vendor

 

Question 6: Identify three examples of personally identifiable information (PII).

 

·         Biometrics, such as a fingerprint

·         Credit Card

·         Full name

·         A one-time passcode sent to your device

·         Your network login credentials

2 September 2020

Fortinet NSE 1 Certification Answers - Bad Actors Quiz


Question 1: What is the motivation of the bad actor known as the “Explorer”?

 

·         Notoriety

·         Money

·         Ideology

·         Food

 

Question 2: What is the motive of the “Cyber Criminal”?

 

·         Fame

·         Money

·         Ideology

·         Intimidation

 

Question 3: What are the primary motivations of the “Hacktivist”?


·         Food, wine, and gambling

·         The appreciation of their country’s leaders

·         Political, social, or moral disagreements

·         The cost of commercial software and support

 

Question 4: Attacking systems by exploiting unknown and unpatched vulnerabilities is also known as:


·         Phishing

·         Secret Sauce

·         First day exploits

·         Zero day exploits

 

Question 5: What is the goal of the “Cyber Terrorist”?


·         Stable world markets

·         Peace through understanding

·         Intimidation through disruption and damage

·         Adoption of bitcoin as a primary national currency

 

Question 6: What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive information?


·         Trolling

·         Harpooning

·         Phishing

·         Baselining

 

Question 7: What central component is necessary to form a botnet?

 

·         DNS Server

·         Ethernet Switch

·         Command & Control (C&C) Server

·         Transformer

 

Question 8: What is the motivation of the “Cyber Terrorist”?

 

·         Compassion

·         Ideology

·         Fortune

·         Fame

 

Question 9: What is the name of the malware that takes over a computer system and holds hostage the disk drives or other data?

 

·         Phishingware

·         Ransomware

·         Scareware

·         Kindnapware

24 February 2018

Disable Computer Port


Hello guys !! Today, I am sharing with you one of the very simple & useful trick, how we can secure data or disable port in computer so no one can access the data using USB(PENDRIVE).

Just follow these below simple steps:

Simply disable your computer ports to prevent the  copying data from unknown user.

Step 1:  Open Start Menu  
                  
Secure data in computer using disable port how we can enable disable ports in computer how we can secure the data in computer .. How we can  stop that no one copy the data from computer
Type  :   regedit 
       


Step 2  :    Press OK !

 Step 3 :   Now just these command:


HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\USBSTOR





Secure data in computer using disable port how we can enable disable ports in computer how we can secure the data in computer .. How we can  stop that no one copy the data from computer
 Step 4: Press HKEY_LOCAL_MACHINE

Secure data in computer using disable port how we can enable disable ports in computer how we can secure the data in computer .. How we can  stop that no one copy the data from computer
 Step 5: Press SYSTEM
Secure data in computer using disable port how we can enable disable ports in computer how we can secure the data in computer .. How we can  stop that no one copy the data from computer
 Step 6: Press CurrentControlSet
Secure data in computer using disable port how we can enable disable ports in computer how we can secure the data in computer .. How we can  stop that no one copy the data from computer
 Step 7: Press Services
Secure data in computer using disable port how we can enable disable ports in computer how we can secure the data in computer .. How we can  stop that no one copy the data from computer
 Step 8: Press USBSTOR
Secure data in computer using disable port how we can enable disable ports in computer how we can secure the data in computer .. How we can  stop that no one copy the data from computer


   



Step 9: Now in the right side box press on START and change the value from 3 to 4 and than press okay

Now Restart Your computer and you will see that port will be disabled !

If you enable this port just follow above steps and just change the value from 4 to 3 and press okay and Restart your computer. This trick is working for all operating system including window 7, 8, 8.1 & window 10. 








13 February 2017

Create funny harmless trick to continuous eject CD/DVD Drives



This is very funny Harmless trick. It can continuously eject your CD/DVD drives working on all operating system including window 7,8 ,8.1 & 10. Just follow these simple steps:-


Step 1 : Open Notepad copy below text in Notepad and save file with techiestrends.vbs 


Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop


Double click on .vbs file  and you will see that CD/DVD continuously eject. You can Stop this restart your computer.