Question 1
In the context of cybersecurity, "Phishing" refers to:
Phishing typically uses spoofed emails or fake websites to trick users into revealing credentials. It is a "Social Engineering" attack.
Question 2
Two-Factor Authentication (2FA) requires a user to provide two out of three types of credentials. Which is NOT one of them?
2FA combines: 1. Knowledge (PIN/Password), 2. Possession (Card/Token/Phone), 3. Inherence (Fingerprint/Iris). "Desire" is not an authentication factor.
Question 3
A "Trojan Horse" in computer security is:
Like the mythical wooden horse, a Trojan appears useful/harmless to trick the user into installing it, after which it executes malicious code (stealing data, creating backdoors).
Question 4
What is the main difference between Symmetric and Asymmetric Encryption?
Asymmetric encryption (Public Key Infrastructure) is crucial for digital banking security (like SSL/TLS) because it allows secure exchange of data without sharing the private secret key.
Question 5
How does "Pharming" differ from "Phishing"?
Pharming is more dangerous because it manipulates the DNS (Domain Name System) server or the user's host file. Even if the user types the correct website address (e.g., www.bank.com), they are redirected to a fraudulent site without clicking any suspicious link, making it harder to detect than Phishing.
Question 6
A "Distributed Denial of Service" (DDoS) attack differs from a simple DoS attack because:
In a DDoS attack, the traffic comes from hundreds or thousands of sources (zombie computers/bots), making it nearly impossible to stop the attack simply by blocking a single IP address. This makes DDoS much more destructive and harder to mitigate than simple DoS.
Question 7
The "Zero Trust" security model in banking IT infrastructure is based on the principle:
Zero Trust assumes that threats exist both inside and outside the network. It requires strict identity verification for every person and device trying to access resources, regardless of whether they are sitting within the network perimeter or outside.
Question 8
Which type of malware restricts access to a computer system (encrypts files) and demands payment to remove the restriction?
Ransomware (like WannaCry) encrypts the user's data and demands a ransom (usually in crypto) for the decryption key. It is a major threat to banking data availability.
Question 9
Which standard is used to secure credit/debit card data during transmission and storage?
Payment Card Industry Data Security Standard (PCI-DSS) is a set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment.
Question 10
In biometric authentication, what does "False Acceptance Rate" (FAR) refer to?
FAR is a critical security metric. It measures the likelihood that the biometric security system will incorrectly accept an access attempt by an unauthorized user. In high-security banking applications (like vaults or server rooms), the system is tuned to have an extremely low FAR, even if it means a slightly higher False Rejection Rate (FRR).
Question 11
"Vishing" is a form of social engineering attack where:
Vishing stands for "Voice Phishing." Criminals pose as bank officials, RBI agents, or tech support over a phone call to create a sense of urgency (e.g., "Your card is blocked") and manipulate victims into sharing OTPs, PINs, or passwords. Smishing involves SMS; Phishing involves Email.
Question 12
In network security, what is the purpose of a "Honeypot"?
A Honeypot is a security mechanism set up to detect, deflect, or counteract attempts at unauthorized use of information systems. It consists of a computer, data, or network site that appears to be part of a network, but is actually isolated and monitored, looking like a valuable target to hackers.
Question 13
An Information Systems (IS) Audit distinguishes between "System Audit" and "Process Audit". What does a Process Audit focus on?
A System Audit looks at the technical aspects (hardware, software, security settings). A Process Audit looks at the human/operational aspect—whether users are following the Standard Operating Procedures (SOPs), like password hygiene, maker-checker discipline, and authorization workflows.
Question 14
The RSA algorithm is a classic example of which type of encryption?
RSA (Rivest–Shamir–Adleman) is the most widely used Asymmetric Encryption algorithm. It uses two different keys: a Public Key to encrypt data and a Private Key to decrypt it. This is the foundation of secure internet communication (SSL/TLS).
Question 15
Data Loss Prevention (DLP) solutions are deployed by banks primarily to:
DLP tools monitor data in motion (network traffic), data at rest (storage), and data in use (endpoints) to ensure that sensitive/confidential data is not leaked, emailed, or uploaded to unauthorized external locations.
Question 16
What is the primary objective of "Penetration Testing" (Pen Testing) in banking security?
Vulnerability Assessment and Penetration Testing (VAPT) is a proactive security measure. While Vulnerability Assessment identifies potential weak points, Penetration Testing goes a step further by actively trying to exploit them to see how deep an attacker can get into the system, helping banks patch holes before real attacks occur.
Question 17
In digital security, "Non-Repudiation" ensures that:
Non-repudiation provides proof of the origin and integrity of data. Digital Signatures provide non-repudiation because only the sender has the private key to sign it; thus, they cannot later claim they didn't send it.
Question 18
A "Keylogger" is a type of spyware that:
Keyloggers run silently in the background, capturing everything typed on the keyboard. This is a common method used to steal Netbanking login credentials.
Question 19
"Pretexting" is a social engineering technique where the attacker:
In Pretexting, the attacker impersonates someone else in authority (e.g., "I am calling from the Bank's Fraud Dept") to manipulate the victim into divulging sensitive data like OTPs.
Question 20
Which of the following is an example of "Inherence" factor in Multi-Factor Authentication (MFA)?
Inherence refers to something the user "is" (Biometrics). Password is "Knowledge" (something you know). OTP/Card is "Possession" (something you have).
Question 21
"Spear Phishing" is a targeted attack where:
Unlike generic phishing (casting a wide net), Spear Phishing targets specific victims using personalized information (name, role) to increase the success rate of the deception.
Question 22
The "Lock Icon" in the browser address bar indicates that the connection is secured using:
SSL (Secure Sockets Layer) or its successor TLS (Transport Layer Security) encrypts the link between the web server and the browser, ensuring privacy and data integrity. It turns HTTP into HTTPS.