It411 Computer Security Prelim Examination

21 Questions | Total Attempts: 490

SettingsSettingsSettings
Please wait...
It411 Computer Security Prelim Examination


Questions and Answers
  • 1. 
    It refers to assets whose value should be protected such as data, software, computers and network equipment.
    • A. 

      Information assets

    • B. 

      Information security

    • C. 

      Tangible assets

    • D. 

      Intangible assets

  • 2. 
    Which is not an example of tangible assets?
    • A. 

      Data printed on paper

    • B. 

      Knowledge and experience of people

    • C. 

      Network equipment

    • D. 

      Servers and computers

  • 3. 
    Which is an example of intangible asset?
    • A. 

      Operating system

    • B. 

      Hard copy of customer information

    • C. 

      Router

    • D. 

      System Unit

  • 4. 
    It refers to information that has been made available to the public such as product catalogs and information on Web pages, and information that can be published without issue.
    • A. 

      Confidential information

    • B. 

      Unpublished information

    • C. 

      Published information

    • D. 

      Marketing information

  • 5. 
    Which is not an example of unpublished information?
    • A. 

      Customer information

    • B. 

      Human resources information

    • C. 

      Product cost sheets

    • D. 

      Product catalogs

  • 6. 
    It refers to the act of manipulating people to obtain important information through physical and personal means and use it for fraudulent purpose.
    • A. 

      Spoofing

    • B. 

      Social engineering

    • C. 

      Deception

    • D. 

      Peeping

  • 7. 
    The process of trespassing into a building or site by using items such as ID card that have been found or stolen.
    • A. 

      Peeping

    • B. 

      Leakage

    • C. 

      Intrusion

    • D. 

      Trash scouring

  • 8. 
    The act of looking at someone's keyboard while they are entering a password.
    • A. 

      Cracking

    • B. 

      Theft

    • C. 

      Peeping

    • D. 

      Trash scouring

  • 9. 
    The act of intruding on a system without authorization in order to rewrite data within a computer using an unauthorized means.
    • A. 

      Theft

    • B. 

      Falsification of information

    • C. 

      Loss of information

    • D. 

      Leakage

  • 10. 
    A malicious program that is created for purposes such as intruding into a computer without the user's knowledge to destroy data within the computer.
    • A. 

      Computer virus

    • B. 

      Spyware

    • C. 

      Email bomb

    • D. 

      Phishing

  • 11. 
    Which among the ff. is not part of the life cycle of a computer virus?
    • A. 

      Infection

    • B. 

      Dormancy

    • C. 

      Appearance of symptoms

    • D. 

      Resistancy

  • 12. 
    The process of masquerading as cleaning staff in order to dig through trash and gather information such as customer information and human resources information.
    • A. 

      Trash scouring

    • B. 

      Peeping

    • C. 

      Leakage

    • D. 

      Cracking

  • 13. 
    Type of virus that infects the location that stores the program that are executed on system launch.
    • A. 

      Program virus

    • B. 

      Boot sector virus

    • C. 

      Macro virus

    • D. 

      BOT virus

  • 14. 
    Type of virus that attempts to conceal itself so that it is hard to find the infection.
    • A. 

      Spyware

    • B. 

      Worm

    • C. 

      Stealth virus

    • D. 

      Trojan horse

  • 15. 
    A newer type of computer virus created for the purpose of using a computer for malicious purposes. Once a computer is infected, a third party with a malicious intent can manipulate the computer and cause serious damage.
    • A. 

      Spyware

    • B. 

      Malware

    • C. 

      Worm

    • D. 

      BOT

  • 16. 
    The act of sending email as if it were from an actual corporation or organization to obtain the personal credit information of the recepient such as credit card numbers, IDs and passwords.
    • A. 

      Cross-site scripting

    • B. 

      Email bombs

    • C. 

      Denial of Service

    • D. 

      Phishing

  • 17. 
    An attack with an attempt to disable the functions of a mail server by sending a large amount of email to overload a server
    • A. 

      Email bomb

    • B. 

      Phishing

    • C. 

      Denial of service

    • D. 

      Buffer overflow

  • 18. 
    The process of scanning a computer to look for open port numbers
    • A. 

      Virus scan

    • B. 

      Port scan

    • C. 

      Password crack

    • D. 

      Security hole

  • 19. 
    A form of password cracking that involves analysis in combination with a file which comprises a large list of descriptions of candidate user names and passwords.
    • A. 

      Dictionary attack

    • B. 

      Password attack

    • C. 

      Buffer overflow attack

    • D. 

      Distributed denial-of-service

  • 20. 
    A form of password cracking which involves analysis in combination with a program that generates random character strings
    • A. 

      Dictionary attack

    • B. 

      Password attack

    • C. 

      Buffer overflow attack

    • D. 

      Brute force attack

  • 21. 
    Type of virus by symptoms that causes destruction to the OS as the basic software, or causes destruction to application software.
    • A. 

      Data destruction

    • B. 

      Program destruction

    • C. 

      Screen display destruction

    • D. 

      Specific date/time message output

Back to Top Back to top