Information Security Session 2 Assessment

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Mschwind
M
Mschwind
Community Contributor
Quizzes Created: 5 | Total Attempts: 2,278
Questions: 11 | Attempts: 383

SettingsSettingsSettings
Information Security Session 2 Assessment - Quiz

Information Security Session 2 Assessment


Questions and Answers
  • 1. 

    Developers use a process known as change control to ensure that the working system delivered to users represents the intent of the developers.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Change control is a process used by developers to manage and track changes made to a system. It ensures that any modifications or updates to the system align with the original intentions of the developers. By implementing change control, developers can maintain the integrity and quality of the working system delivered to users. Therefore, the statement that developers use change control to ensure that the working system represents their intent is true.

    Rate this question:

  • 2. 

    A _________________________ is when the attacker sends a large number of connection or information requests to a target and the system becomes overloaded and cannot respond to legitimate requests for service.

    • A.

      Man-in-the-middle attack

    • B.

      Denial-of-service attack

    • C.

      Spoofing attack

    • D.

      Brute force attack

    Correct Answer
    B. Denial-of-service attack
    Explanation
    A denial-of-service attack occurs when an attacker floods a target system with a large volume of connection or information requests, overwhelming the system's resources and preventing it from responding to legitimate requests for service. This can effectively disrupt the availability of the targeted system, denying access to legitimate users.

    Rate this question:

  • 3. 

    A ___________________ is an identified weakness in a controlled system, where controls are not present or are no longer effective.

    • A.

      Vulnerability

    • B.

      Dictionary attack

    • C.

      Hoax

    • D.

      Password crack

    Correct Answer
    A. Vulnerability
    Explanation
    A vulnerability refers to a weakness in a controlled system where either controls are not present or they have become ineffective. This means that there is a potential for exploitation or breach of security in the system. It is important to identify and address vulnerabilities in order to maintain the integrity and security of the controlled system.

    Rate this question:

  • 4. 

    Since a brownout is only a temporary drop in power voltage, no serious damage can come to electrical systems.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    A brownout is not just a temporary drop in power voltage, but rather a sustained decrease in voltage that can cause serious damage to electrical systems. This can lead to overheating of appliances, damage to sensitive electronic devices, and even electrical fires. Therefore, the statement that no serious damage can come to electrical systems during a brownout is false.

    Rate this question:

  • 5. 

    Trojan horses are software programs that hide their true purpose, and reveal their designed behavior only when activated.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Trojan horses are a type of malicious software that deceive users by disguising their true purpose. They appear harmless or useful, but once activated, they reveal their true behavior, which is usually harmful or malicious. This is why they are called "Trojan horses," as they mimic the concept of the Greek myth where a wooden horse appeared harmless but contained hidden soldiers inside. Therefore, the statement that Trojan horses hide their true purpose and only reveal their designed behavior when activated is true.

    Rate this question:

  • 6. 

    A phreaker is someone who hacks into the public telephone network to make free calls or disrupt services.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A phreaker is indeed someone who hacks into the public telephone network to either make free calls or disrupt services. This term originated in the 1970s and was used to describe individuals who exploited vulnerabilities in the phone system to bypass charges or cause disruptions. Phreaking is considered a form of hacking and is illegal in many jurisdictions.

    Rate this question:

  • 7. 

    When information gatherers employ techniques that cross the threshold of what is legal or ethical, they are conducting ________________________.

    • A.

      Industrial espionage

    • B.

      Competitive intelligence

    • C.

      Shoulder surfing

    Correct Answer
    A. Industrial espionage
    Explanation
    When information gatherers employ techniques that cross the threshold of what is legal or ethical, they are conducting industrial espionage. This term refers to the practice of gathering confidential information or trade secrets from a competitor or rival company through illegal or unethical means. It involves activities such as hacking, bribery, or theft of proprietary information, with the intention of gaining a competitive advantage. This practice is illegal and unethical because it violates privacy laws and undermines fair competition in the business world.

    Rate this question:

  • 8. 

    A deliberate act of theft would be:

    • A.

      Equipment failure

    • B.

      Piracy or copyright infringement

    • C.

      Illegal confiscation of equipment or information

    Correct Answer
    C. Illegal confiscation of equipment or information
    Explanation
    A deliberate act of theft refers to the intentional and unlawful taking of someone's property or information without their permission. Equipment failure, piracy or copyright infringement may involve unauthorized use or access, but they do not necessarily involve the deliberate act of theft. On the other hand, illegal confiscation of equipment or information specifically implies the intentional and unlawful seizure or taking of someone's property or information, making it the correct answer in this context.

    Rate this question:

  • 9. 

    Information security has more to do with technology than management.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    This statement is false because information security is not solely dependent on technology. While technology plays a crucial role in implementing security measures, effective information security also requires proper management and organizational practices. This includes creating policies and procedures, conducting risk assessments, training employees, and enforcing security protocols. Without the involvement of management and the implementation of appropriate practices, technology alone cannot ensure information security.

    Rate this question:

  • 10. 

    Both general management and information technology management are responsible for implementing information security.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Both general management and information technology management are responsible for implementing information security because effective information security requires a combination of managerial and technical controls. General management is responsible for setting policies, procedures, and guidelines to ensure that information security is prioritized and integrated into the overall business strategy. Information technology management, on the other hand, is responsible for implementing and maintaining the technical controls necessary to protect the organization's information assets. Therefore, both management functions play a crucial role in ensuring the security of information within an organization.

    Rate this question:

  • 11. 

    Unlike any other of the information technology programs, the primary mission of an information security program is to ensure that systems and their contents remain the same.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The primary mission of an information security program is indeed to ensure that systems and their contents remain the same. Information security programs are designed to protect the integrity, confidentiality, and availability of information and systems. By implementing various security measures such as access controls, encryption, and monitoring, these programs aim to prevent unauthorized access, alteration, or destruction of data. Therefore, the statement is true.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 23, 2009
    Quiz Created by
    Mschwind
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.