Você está na página 1de 77

Certified Secure Computer

User (CSCU)

Bekerjasama
Dengan

Fakultas Ilmu Komputer


Partnership : 23 September 2014
Ditandatangani oleh : Rektor Universitas Mercu Buana dan Country Manager Ec Council
Ec Council adalah organisasi yang memberikan sertifikasi kepada tiap individu dalam
berbagai bidang e-business dan keahlian keamanan informasi. Pemilik dan pencipta dari
sertifikasi yang terkenal dan telah diakui di seluruh dunia, Certified Ethical Hacker (CEH).
TUJUAN PELATIHAN
1. Memberikan Pengetahuan dan keterampilan untuk melindungi aset
informasi mereka.
2. Memberikan pemahaman keamanan komputer dan jaringan
komputer dasar, seperti ancaman pencurian identitas, penipuan
kartu kredit, pemalsuan online banking, virus dan backdoors, email
palsu, hacking.
3. Memberikan pengertian bagaimana cara meminimalisir kebocoran
informasi-informasi pribadi tersebut.
Materi CSCU
Foundations of Security Securing Online Transactions
Securing Operating Systems Securing Email Communications
Protecting Systems Using Social Engineering and Indentity
Antiviruses Theft
Data Encryption Security on Social Networking
Data Backup and Disaster Sites
Recovery Information Security and Legal
Internet Security Compliance
Securing Network Connections Securing Mobile Devices
Download di :
Ppt fasilkom.mercubuana.ac.id
Pdf Aspen.eccouncil.org
REGISTER ASPEN.ECCOUNCIL.ORG
Step 1 : Complete
the official
training.
Step 2 : Visit:
https://aspen
.eccouncil.org.
Step 3 : Click Register and fill
out the registration form.
Click Register button.
Step 4 : Using the email you
provided in step 3, follow the
instruction in the auto-
genereted email to activate
your EC-Council Aspen Portal
account.
Download Digital Copy of Class Certificate of
Attendance
Login
Click Class Eval icon in the Student
Services section.
Enter the EEC (see the attached code
below) in the Evalution Code field nd
click Submit.
Fill the Course Evalution Form. Note:
All fields on this form are mandatory.
Click Submit Classroom Evalution
button.
In Course Evalution Submission page,
click the Download Certificate of
Attendance button to download your
certificate of attendance.
Register for the exam. Please use your
exam voucher and EEC to register.
Attempt the exam.
Instructions for Downloading your Electronic
Courseware, Lab Manuals, and Tools.
Login
Once successfully logged in, click Academia icon
under the Learning Resources section. It will open
Academia page.
Enter the access code below in the Access Code field
and click Submit button.
Access Code:XXXXXXXXXXXXX
If your Access Code is valid, you will be able to view
the e-courseware and lab manuals in the Select Masukkan
Courseware dropdown menu.

Pilih Academia
Instructions for Exam

Klik Register
Isi Data

Klik Continue

Klik Register
Pilih Test

Pilih Yes
Hasil Ujian
SERTIFIKAT
Module 01 : Foundations of Security
Understand :
What data is and the difference between data and information
How often data is generated
The importance of personal and organizational data
Different threats to data
What data security is and the risks associated with data compromise
Elements of security
The potential losses due to a data breach
How to implement data security
Module 02 : Securing Operating Systems
Lock a windows system when not in use
Create and change a user account password for a windows system
Disable the guest account of a windows system
Lock out unwanted guests from a windows system
Rename the administrator account of a windows system
Disable jumb lists of a windows system
Enable software updates in a windows system
Enable the firewall in a windows system
Add new apps in the firewall of a windows system
Remove/disable app rules from the firewall of a windows system
Create a new firewall rule in a windows system
Turn on windows defender
Enable bitlocker in a windows system
Understand windows encrypting file system
Decrypt a file using EFS in a Windows system
Disable unnecessary services in a windows system
Kill unwanted processes in a windows system
Hide files and folders in a windows system
Disable simple file sharing in a windows system
Lock a mac system, when not in use
Disable automatic login in a mac
Allow app downloads from the Mac app store
Enable automatic software updates in a Mac
Disable the guest account in a Mac
Enable FileVault in a mac
Enable the Firewall in a Mac
Change User account password in a Mac
Enable and set parental Controls in a Mac
Module 3 : Malware and Antivirus
Understand what malware is
Identify the various types of Malware
Identity the various symptoms of Malware Infections
Understand what an antivirus is and how it works
Understand how to choose the right antivirus software for you and
what its limitations are
Configure and use Kaspersky and Avast antivirus software
Test if your antivirus is working
Module 4 : Internet Security
Understand :
The basic security measures to implement when online
The different threats web browsers pose and their countermeasures
Configure web browsers in a secure manner
The different threats posed by instant messaging apps and their
countermeasures
The different risks children are exposed to when online
Know about and use children friendly web browsers like KidZui
Identify :
A secure website
If a child is a victim of online abuse and take corrective measures if so
Module 5 : Security on Social Networking
Sites
Understand :
The concept of virtual social networking
What a profile is on a social networking site and the information it contains
The risks associated with online social networking
What geotagging is and the risks it poses
Various risks of online social networking that minors are exposed to
Configure :
The security settings of Facebook and Twitter
Module 6 : Securing Email Communications
Understands :
The concept of an email
Why email security is important
The various threats associated with using email
The various email security procedures
Identify the different email client products and service providers
available
Module 7 : Securing Module Devices
Understand :
The basics of mobile security and its importance
The importance of an IMEI Number of a mobile phone
The risks that a mobile device is exposed to
What mobile malware is
The threats that Bluetooth poses to a mobile device
The various security procedure of an android device, an IOS device, and a
windows device
Identify various mobile security tools
Module 8: Securing The Cloud
Understand :
The various types of clouds available and the different services they offer
The advantages of a cloud service
The Different thereats posed to a cloud account and their countermeasures
The different privacy issues related to a cloud account and how to address
them
How to choose the correct cloud advisor as per your needs
Module 9 : Securing Network Connections
Understand :
The different types of networks
How to set up your home network
How to set up wireless networks in Windows and Mac
The Various threats to a wireless network and their countermeasures
How to use a firewall, antivirus, and encryption to secure a wireless network
Module 10 : Data Backup and Disaster
Recovery
Understand :
The Importance and need for data backups
The reasons behind data loss incidents
What files to back up and when
The different types of data backups
How to create backups and restore data from them in Windows and Mac
The difference between data deletion and data destruction and the
importance of the latter
LATIHAN SOAL
What does a lock icon symbolize besides a website name?
a. The website needs a password to be accessed
b. The website cannot be accessed without the site admins
permission
c. The website is a secure website
d. The website is not accessible at the moment
Horace is a 64 year-old man who worked as an accountant for SN Associates
before his retirement. The company gifted him a laptop at the time of his
retirement. Since Horace was not a technically savvy person, he did not
install any applications on his laptop, and only used it for checking his email
and playing poker online. After some time, Horaces laptop started giving him
problems. It crashed frequently, often displayed the Blue Screen of Death
(BSOD), and unwanted windows kept popping up whenever he went online.
When Horace took his laptop to the service center, he was told that his
laptop was infected with malware.
Which software should Horace have installed to prevent malware infection in
his laptop?
a. Adobe Reader
b. Antivirus software
c. One Drive
d. Skype
Harold, an associate at AQ Corporation, received a phone call from a
person claiming to be Bob from the IT department. Bob told Harold
that he had noticed that Harolds computer was running slow, and
could help him fix it. Harold, not having much knowledge regarding
computers, readily agreed. Following Bobs instructions, Harold typed
in some commands on his computer, and gave remote access to Bob to
have his computer fixed. Later on, Harold noticed that confidential
information concerning his clients was missing from his computer.
Which attack was Harold a victim of?
a. War driver
b. Evil twin
c. Social engineering
d. Bluesnarfing
Ruth Cole is a sales manager and travels extensively on business. She
regularly updates and stores clients data on a remote data storage
device via the Internet, so that in case she loses her laptop or it crashes
for some reason, she does not lose the data which is essential to
carrying out her work.
Which type of data backup is Emma using to carry out her daily work?
a. Differential backup
b. Incremental backup
c. Online data backup
d. Full system backup
A new online service allows people living with roommates to feed in all
their house hold expenses in its share calculator program. The
program then calculates how much each person is supposed to pay and
sends a detailed report to all those who are listed as roommates for
that particular transaction.
The above mentioned service is an example of which of the following?
a. Network as a Service
b. Software as a Service
c. Infrastructure as a Service
d. Platform as a Service
John is an 18 year-old college-going student. He loves to read books and
listen to music on his laptop. He regularly downloads e-books and music
from the internet. Lately, whenever John has been spending time on his
laptop, the laptop begins displaying the infamous Blue Screen of Death
(BSOD). Upon taking his laptop to the service center, John was told that his
laptop was infected with malware.
Which symptom of malware infection is Johns laptop displaying?
a. Laptop screen malfunction
b. Hard drive malfunction
c. Unexpected crashes
d. Slow system
Which of the following is the strongest password?
a. Domike*
b. Donna1992
c. donnamike92
d. Pa#72tLe
Which of the following terms refers to the process of protecting
information, and the infrastructure that stores it?
a. Keystroke logging
b. Maintenance
c. Availability
d. Data security
Luke works as an analyst for AS Pvt. Ltd. His job there is to analyze
statistics and records obtained from people to improve the sales of the
company. However, recently the statistics and records given to him
have been incorrect, thus leading to gross miscalculations and wrong
predictions on his part. Which of the terms listed below, best describes
these statistics and records that are incorrect?
a. Information
b. Data
c. Archives
d. Indicators
Duke is taking some of the best pictures he has yet as an amateur
photographer in a pen drive to get his work assessed by an expert. On
the subway an unknown person picks his pocket. Along with his wallet
Duke also lost the pen drive with his pictures. Since he had not made
any more copies of those pictures, he lost them forever.
What type of data loss is this?
a. Hardware theft
b. Malware attack
c. Natural disaster
d. Software theft
Andrew lost his iPhone on the way home from college. He anxiously
wanted to recover it, as it was a gift from his late grandfather. The
iPhone also contained pictures that he had taken for a national
photography contest.
Using which iOS feature, can Andrew locate his phone?
a. iCloud backup
b. SIM lock
c. Find my iPhone
d. System updates
Andrew lost his iPhone on the way home from college. He anxiously
wanted to recover it, as it was a gift from his late grandfather. The
iPhone also contained pictures that he had taken for a national
photography contest.
Using which iOS feature, can Andrew locate his phone?
a. iCloud backup
b. SIM lock
c. Find my iPhone
d. System updates
Which of the following fundamental concepts of security refers to an
action taken in advance to protect the system against threats or
dangers?
a. Maintenance
b. Nonrepudiation
c. Precaution
d. Reaction
Which of the following software programs runs on the internet and
allows users to find, access, and display web pages?
a. Email
b. Web browsers
c. Extensions
d. Search engine
A newly established ITES company plans to launch a website which
enables its users to share pictures and videos with each other. Apart
from this, users can also comment on these pictures and share them
further.
Under which of the following cloud categories will the companys
product come?
a. Public Cloud
b. Private Cloud
c. Community cloud
d. Hybrid Cloud
InfraTech Inc. is an international IT company with offices in Dubai, Singapore,
and Australia. To have continuity of business practice, it is imperative that all
the branch offices be able to communicate amongst themselves.
Which of the following network systems would be suitable for data
communication between the employees of all branches of InfraTech Inc.?
a. Ethernet
b. Local Area Network
c. Virtual Private Network
d. Wide Area Network
Which of the following terms refers to the process that ensures
accuracy of the sender and receiver of a message?
a. Nonrepudiation
b. Data
c. Authenticity
d. Availability
Which of the following terms refers to a collection of information that
defines or describes the user and his or her interests?
a. Facebook group
b. Account settings
c. Timeline
d. Profile
Sam uses his work laptop to watch pirated movies at home sometimes.
When he tried to watch the latest movie he downloaded, the movie file did
not play even after trying on several different players. Within a day of this,
Sam noticed that many of his files were vanishing one after the other from
his laptop even though neither he nor anyone else deleted them. The
network administrator of his company, after taking a look at his computer
told him that the movie files, which did not play, definitely had something to
do with this peculiar behavior.
What type of data loss could this be?
a. Software failure
b. Computer virus
c. Human error
d. Natural disaster
Alex, the coach of Manchester United, called up Wayne, the captain of the
team, to discuss the tactics they would employ in the upcoming Champions
League Final. The following day, Alex received an email with the transcript of
the conversation he had with Wayne. The sender of the email threatened to
make Alexs tactics public, if he did not pay him $5000.
Which form of mobile device attack was Alex a victim of?
a. Social engineering
b. Man in the middle attack
c. Eavesdropping
d. Phishing
Raymond received an email from an official claiming to be from his bank. The
email requested Raymond to send his personal details since the customer
database of the bank was being updated. Upon confirmation from the bank,
Raymond was told that the bank had not sent any emails asking for the
personal details of their customers.
Which cyber-attack would Raymond have been a victim of if he had replied
to the email?
a. Man in the middle attack
b. War driver
c. Eavesdropping
d. Phishing
Ellie, an 18 year-old student, shares her Windows computer with her
younger brother, Adam. Adam is very mischievous and whenever he is on the
computer, he ruins Ellies college assignments. Ellie, who is fed up of this
decides to encrypt the drive that contains her assignments. She uses inbuilt
Windows software to encrypt the drive so that Adam cannot access the
drive.
Which software did Ellie use?
a. BitLocker
b. Adobe
c. Skype
d. SPAMfighter
Fred, a 14 year-old boy, is an only child. Fred loves spending time on his Mac
OS X browsing the internet. When his parents are not at home, he spends
hours at a stretch on the computer. Once, when Freds parents come home
late from work and find him on the Mac, they decided to limit his computer
time. Enabling an inbuilt feature in the Mac, Freds parents limit his
computer time to two hours daily.
Which MAC OS X feature did Freds parents enable?
a. FileVault
b. Parental control
c. Jump lists
d. UAC slider bar
Which of the following antivirus techniques refers to the process of
comparing the current state of stored programs to a previously
recorded state, which is known to be free of malware?
a. Bookmarks method
b. Integrity checking
c. Scanning
d. Heuristics analysis
Tom, a 14 year-old boy has been chatting online with Adam, whom Tom assumes is
14 years old as well. Over the months, they built up a great online friendship,
playing online games, checking out EDM websites, continuing with their friendly
rivalry over football, and just talking about guy stuff. When Adam invited Tom over
to meet him, Tom was obviously excited. However, when Tom met Adam, he was
shocked, as Adam turned out to be a 35 years old man. Despite this shock, Tom
entered Adams house, as he trusted him. Tom was having a great time playing PS3
with Adam, until the time Adam touched him inappropriately. Tom ran away from
Adams house and did not know what to do.
Which form of cyber-attack was Tom a victim of?
a. Pornography
b. Social engineering
c. Grooming
d. Phishing
You received the following email from an official claiming to be from your bank.
Dear ABC Bank User,
Since we will be updating our customer database shortly, you are kindly requested to send the
following information.
Name
Bank login id
Password
Branch
Date of birth
Alternate email
Please click the below link to update your details.
Proceed to update your account details
Please contact the ABC Bank customer team in case of any queries. Thank you for your cooperation.
Which type of email security threat is this?
a. Phishing
b. Malicious email attachment
c. Nigerian scam
d. Spy-phishing
Which of the following helps to backup data on a Mac?
a. Extensions
b. App Store
c. Internet Accounts
d. Time Machine
This part of an email informs you about the address from where it
came, time of the message, date sent, and the subject line.
Identify the email part?
a. Signature
b. Header
c. Footer
d. Body
Lucy, a 55 year-old woman, was not a technically savvy person. She did not
install or enable any applications on her computer, and only used it for
looking up recipes and knitting patterns. After some time, Lucys computer
started giving her problems. It often displayed the Blue Screen of Death
(BSOD) and unwanted windows kept popping up whenever she went online.
When a computer technician checked Lucys computer, it was discovered
that her computer was infected with malware.
Which inbuilt Windows software should Lucy have enabled to prevent
malware infection in her computer?
a. Task manager
b. Jump lists
c. Simple file sharing
d. Windows Defender
Sally is a 16-year-old high school student who is extremely attached to her
laptop. She uses it to download and watch episodes of her favorite sitcom.
While watching one of the episodes, her laptop switched off automatically a
couple of times. Suspecting a malware infection, she opened the antivirus
software on her laptop and chose a technique, which examined all files on
the memory and hard disk in order to identify and locate the malware.
Which antivirus technique did Sally employ?
a. Bookmarks method
b. Integrity checking
c. Heuristics analysis
d. Scanning
Which of the following terms refers to malicious software that is
specifically built to target mobile phones and smartphones systems?
a. Unmanaged applications
b. Broken cryptography
c. Mobile malware
d. Phishing
Which privacy issue of clouds exposes users to the risk of their data
being accessed by the cloud service provider without the users
consent?
a. Data migration
b. Data ownership
c. Data location
d. Data permanency
Which of the following terms refers to software that attackers create to
install on a victims computer in order to compromise its security?
a. Lockbin
b. Malware
c. Dropbox
d. Bitlocker
Which of the following websites can Windows Phone users use to
locate their stolen smartphone?
a. http://www.symbianguru.com/tracking-mobile-with-phone-
guardian.html
b. account.microsoft.com/devices
c. iCloud.com
d. android.com/devicemanager
Amy received an email from an official claiming to be from ABC Parcel
Services. The email asked her to collect a gift parcel sent by her friend three
weeks ago. The service claimed that they were unable to deliver the parcel
to Amy, as the address provided was wrong. The service asked her to print
out the attached invoice copy, fill it, and collect the package from the branch
office located in her city. .
Which type of email security threat could Amy have faced, if she clicked or
downloaded the attachment?
a. Phishing
b. Hoax mail
c. Malicious user redirection
d. Malicious email attachment
ABC Info Ltd. has a part of its business already on a cloud computing
platform. However, its new product suite would need a cloud service which
runs on a totally different technology. The company should be able to make
its legacy products and new products communicate with each other as the
new products are just an upgrade of the old ones and much of the required
data still resides on the old cloud.
Which of the following cloud computing platforms will be suitable for ABC
Infos future needs?
a. Hybrid cloud
b. Private cloud
c. Community cloud
d. Public cloud
Daniel, a bank officer, communicates with his clients through emails on a
daily basis. Recently, he noticed that his Gmail inbox was filled with
unsolicited emails. The cluttered inbox annoyed him, as it was difficult to
filter the important emails. Hence, he decided to find a solution for it. Upon
inquiry, a service provider told him that he could use software which
automatically filters out the unsolicited emails. This software would not only
protect his Gmail account, but also protect all the email accounts configured
on his email client.
Which of the following tools did Daniel probably enquire about?
a. Norton
b. Kaspersky
c. Avast Pro
d. SPAMfighter
Isaac is transferring all the data from his computer to an external drive as he
wants to format his laptop. While moving the data, he accidentally hits
delete instead of cut on one of the files and without realizing, hit the enter
key when the computer prompted to confirm his action. As the file was a
huge one, it did not go to the recycle bin and got permanently deleted.
What type of data loss is this?
a. Software failure
b. Computer virus
c. Human error
d. Hardware theft
Janines parents gave her a smartphone for her birthday. The phones
operating system intrigued and delighted Janine at the same time. This
was because it was the first time she had seen a smartphone that had a
tile-based setup. In addition, the tiles could be removed and
interchanged on the home screen.
Which operating system did Janines phone have?
a. Windows
b. Symbian
c. iOS
d. Android
Sarah has recently rented a small room on ABC Street, and started a
business with seven employees. She provided every employee with a
computer and a common printer which is meant to be shared by
everyone.
Which of the following networks would suit Sarahs business need?
a. Wide Area Network
b. Virtual Private Network
c. Ethernet Physical Layer
d. Local Area Network
Hermione is a 21 year-old college student. She loves spending time on
Facebook. However, with her final exams approaching, she feels that
spending time on Facebook will harm her exam results. Hence, she
enables a particular Facebook feature, with the help of which, she will
not get any emails or notifications from Facebook.
Which Facebook feature did Hermione use?
a. Who can look me up ?
b. Deactivate account
c. Login alerts
d. Where youre logged in
Hermione is a 21 year-old college student. She loves spending time on
Facebook. However, with her final exams approaching, she feels that
spending time on Facebook will harm her exam results. Hence, she
enables a particular Facebook feature, with the help of which, she will
not get any emails or notifications from Facebook.
Which Facebook feature did Hermione use?
a. Who can look me up ?
b. Deactivate account
c. Login alerts
d. Where youre logged in
Certain software applications add or modify a particular feature in a
browser. A few versions allow users to block ads, watch online videos,
or IM with friends.
What is this application called?
a. ActiveX
b. Extensions
c. Cookies
d. Java
As part of his security implementation plan, Glenn was updating his
firewall. Which aspect of the security implementation plan was Glenn
working on?
a. Nonrepudiation
b. Reaction
c. Precaution
d. Maintenance
Samuel, a network admin in an IT firm, has just discovered a phishing site
known for targeting corporate entities. Several employees have received
emails with the domain name, which is the same as that of this site. In order
to prevent the companys network from being corrupted, Samuel decides to
block all incoming and outgoing traffic from that site.
Which of the following defense mechanisms can Samuel use to implement
this?
a. Encryption
b. Virus
c. Firewall
d. Disk encryption
Susan downloaded a software from the Internet and installed it on her
computer for watching movies online. After installing the software, she
noticed that her PC was slowing down and was taking more time to
open webpages.
What could Susan do to solve this problem?
a. Start using Ethernet
b. Install a latest antivirus software and scan her computer
c. Stop using wireless internet connection
d. Choose a suitable encryption method
Harry, a 21 year-old college-going student, was working on his dissertation
when suddenly a message flashed on his screen, All files on your computer
have been encrypted. You must pay $1000 within 72 hours to regain access
to your data.Even after Harry paid the money, he was not able to access his
data, and all the documents on his dissertation were lost.
Which malware attack was Harry a victim of?
a. Botnet
b. Virus
c. Ransomware
d. Adware
Susan, a 15-year-old girl, loves spending her free time baking and cycling.
However, recently she has been spending all of her free time glued to the
computer. She shows no interest in her hobbies anymore and looks
depressed most of the time. Her parents also noticed that whenever they
enter her room, she quickly changes the computer screen. Understandably,
Susans parents are worried about her.
What could be the reason for her behavior?
a. Social engineering
b. Too much pressure at school
c. Victim of online child abuse>?
d. Unsolicited emails
Imagine getting a letter from the Inland Revenue Authority of Singapore (IRAS)
demanding that you pay $5,700 in taxes. This is what happened to Rick. He
received a letter informing him that he owed the government unpaid income tax on
wages he never earned. The IRAS letter said that Rick had worked at several places.
However, Rick is only 15 years old and his only job was working at his uncles
grocery store during the summer. He had never even visited some of the places
where the letter said he worked. Rick was not sure what to do next. After all, he
has never even had a real job like those listed in the letter.
What is going on in this scenario?
a. Social engineering
b. Identity Theft
c. Nigerian scam
d. Phishing
XYZ Infra Solutions, a startup company is looking for a cloud service
provider who can provide virtual machines, virtual local area network,
customized software applications, on demand storage, IP addresses,
and firewalls to meet its business needs.
Which of the following cloud computing services can meet the business
needs of the company?
a. Platform as a Service
b. Software as a Service
c. Infrastructure as a Service
d. Application as a Service
Which of the following is an encryption program in Mac that helps
users to protect their data?
a. Safari
b. SPAMfighter
c. FileVault
d. Lockbin
TERIMA KASIH
&
SEMOGA SUKSES

Você também pode gostar