It411 Computer Security Prelim Examination

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Jeanoculam
J
Jeanoculam
Community Contributor
Quizzes Created: 1 | Total Attempts: 690
Questions: 21 | Attempts: 690

SettingsSettingsSettings
It411 Computer Security Prelim Examination - Quiz


Questions and Answers
  • 1. 

    It refers to assets whose value should be protected such as data, software, computers and network equipment.

    • A.

      Information assets

    • B.

      Information security

    • C.

      Tangible assets

    • D.

      Intangible assets

    Correct Answer
    A. Information assets
    Explanation
    Information assets refer to assets whose value should be protected, such as data, software, computers, and network equipment. These assets hold valuable information and are crucial for the functioning and success of an organization. Protecting these assets from unauthorized access, theft, or damage is essential to maintain the confidentiality, integrity, and availability of the information they hold. Safeguarding information assets is a fundamental aspect of information security practices. Tangible assets refer to physical assets that can be touched, while intangible assets refer to non-physical assets such as intellectual property or brand reputation.

    Rate this question:

  • 2. 

    Which is not an example of tangible assets?

    • A.

      Data printed on paper

    • B.

      Knowledge and experience of people

    • C.

      Network equipment

    • D.

      Servers and computers

    Correct Answer
    B. Knowledge and experience of people
    Explanation
    Knowledge and experience of people is not an example of tangible assets because it refers to the intangible qualities possessed by individuals. Tangible assets are physical assets that can be touched or seen, such as data printed on paper, network equipment, servers, and computers.

    Rate this question:

  • 3. 

    Which is an example of intangible asset?

    • A.

      Operating system

    • B.

      Hard copy of customer information

    • C.

      Router

    • D.

      System Unit

    Correct Answer
    A. Operating system
    Explanation
    An operating system is an example of an intangible asset because it cannot be physically touched or seen. It is a software program that allows a computer to function and manage hardware and software resources. Unlike a hard copy of customer information, a router, or a system unit, an operating system does not have a physical form and exists only in the form of code and instructions. Therefore, it is considered an intangible asset.

    Rate this question:

  • 4. 

    It refers to information that has been made available to the public such as product catalogs and information on Web pages, and information that can be published without issue.

    • A.

      Confidential information

    • B.

      Unpublished information

    • C.

      Published information

    • D.

      Marketing information

    Correct Answer
    C. Published information
    Explanation
    Published information refers to information that has been made available to the public, such as product catalogs and information on web pages. It is information that can be accessed and viewed by anyone without any restrictions or limitations. This type of information is not confidential or unpublished, and can be freely distributed or shared.

    Rate this question:

  • 5. 

    Which is not an example of unpublished information?

    • A.

      Customer information

    • B.

      Human resources information

    • C.

      Product cost sheets

    • D.

      Product catalogs

    Correct Answer
    D. Product catalogs
    Explanation
    Product catalogs are not an example of unpublished information because they are typically distributed to customers and made available for public viewing. Unpublished information refers to confidential or restricted data that is not accessible to the general public. In contrast, customer information, human resources information, and product cost sheets are examples of unpublished information as they contain sensitive data that is not intended to be shared with the public.

    Rate this question:

  • 6. 

    It refers to the act of manipulating people to obtain important information through physical and personal means and use it for fraudulent purpose.

    • A.

      Spoofing

    • B.

      Social engineering

    • C.

      Deception

    • D.

      Peeping

    Correct Answer
    B. Social engineering
    Explanation
    Social engineering refers to the act of manipulating people to obtain important information through physical and personal means and use it for fraudulent purposes. This can involve techniques such as impersonation, deception, and manipulation to gain the trust of individuals and exploit their vulnerabilities. It is a form of psychological manipulation that aims to trick people into divulging sensitive information or performing actions that may compromise their security.

    Rate this question:

  • 7. 

    The process of trespassing into a building or site by using items such as ID card that have been found or stolen.

    • A.

      Peeping

    • B.

      Leakage

    • C.

      Intrusion

    • D.

      Trash scouring

    Correct Answer
    C. Intrusion
    Explanation
    Intrusion refers to the act of trespassing into a building or site by using items such as an ID card that have been found or stolen. It involves gaining unauthorized access to a restricted area by exploiting stolen or misplaced identification credentials. This can be done with the intention of stealing valuable information, causing damage, or carrying out illegal activities within the premises.

    Rate this question:

  • 8. 

    The act of looking at someone's keyboard while they are entering a password.

    • A.

      Cracking

    • B.

      Theft

    • C.

      Peeping

    • D.

      Trash scouring

    Correct Answer
    C. Peeping
    Explanation
    Peeping refers to the act of looking at someone's keyboard while they are entering a password. This behavior is typically done with the intention of obtaining unauthorized access to the person's account or stealing sensitive information. It is considered a form of invasion of privacy and can lead to various security breaches.

    Rate this question:

  • 9. 

    The act of intruding on a system without authorization in order to rewrite data within a computer using an unauthorized means.

    • A.

      Theft

    • B.

      Falsification of information

    • C.

      Loss of information

    • D.

      Leakage

    Correct Answer
    B. Falsification of information
    Explanation
    The act described in the question involves intruding on a system without authorization and using unauthorized means to rewrite data within a computer. This action does not involve theft or loss of information, as the focus is on unauthorized manipulation rather than taking or losing data. Instead, it is more accurately described as falsification of information, as the unauthorized access is used to alter or manipulate data within the system. Leakage is not an appropriate term for this action, as it implies unintentional or accidental disclosure of information, which is not the case here.

    Rate this question:

  • 10. 

    A malicious program that is created for purposes such as intruding into a computer without the user's knowledge to destroy data within the computer.

    • A.

      Computer virus

    • B.

      Spyware

    • C.

      Email bomb

    • D.

      Phishing

    Correct Answer
    A. Computer virus
    Explanation
    A computer virus is a malicious program that is created with the intention of intruding into a computer without the user's knowledge and causing harm. It is designed to destroy or corrupt data within the computer. Unlike spyware, which is primarily used to gather information without causing direct harm, a computer virus is specifically created to cause damage. An email bomb is a different type of attack that involves overwhelming a user's email inbox with a large number of emails, causing it to crash or become unresponsive. Phishing, on the other hand, is a form of cyber attack where attackers try to trick users into revealing sensitive information such as passwords or credit card details.

    Rate this question:

  • 11. 

    Which among the ff. is not part of the life cycle of a computer virus?

    • A.

      Infection

    • B.

      Dormancy

    • C.

      Appearance of symptoms

    • D.

      Resistancy

    Correct Answer
    D. Resistancy
    Explanation
    Resistancy is not part of the life cycle of a computer virus because it does not involve any stage or process that is typically associated with the life cycle of a virus. The life cycle of a computer virus typically includes stages such as infection, dormancy, and the appearance of symptoms. Resistancy, on the other hand, refers to the ability of a virus to withstand or counteract attempts to eliminate it, which is not a stage in the life cycle but rather a characteristic of the virus itself.

    Rate this question:

  • 12. 

    The process of masquerading as cleaning staff in order to dig through trash and gather information such as customer information and human resources information.

    • A.

      Trash scouring

    • B.

      Peeping

    • C.

      Leakage

    • D.

      Cracking

    Correct Answer
    A. Trash scouring
    Explanation
    Trash scouring refers to the process of masquerading as cleaning staff in order to dig through trash and gather information such as customer information and human resources information. This involves going through discarded documents, files, or any other materials that may contain valuable or sensitive information. This method is often used by individuals or groups seeking to obtain confidential information for malicious purposes. It is a form of social engineering where the attacker takes advantage of lax security measures and the assumption that trash is not a source of valuable information.

    Rate this question:

  • 13. 

    Type of virus that infects the location that stores the program that are executed on system launch.

    • A.

      Program virus

    • B.

      Boot sector virus

    • C.

      Macro virus

    • D.

      BOT virus

    Correct Answer
    B. Boot sector virus
    Explanation
    A boot sector virus is a type of virus that infects the location that stores the program that is executed on system launch. When a computer is started, the boot sector virus loads itself into the computer's memory, allowing it to infect other files and spread throughout the system. This type of virus specifically targets the boot sector, which is responsible for starting up the computer and loading the operating system. By infecting the boot sector, the virus can gain control over the system and potentially cause damage or steal information.

    Rate this question:

  • 14. 

    Type of virus that attempts to conceal itself so that it is hard to find the infection.

    • A.

      Spyware

    • B.

      Worm

    • C.

      Stealth virus

    • D.

      Trojan horse

    Correct Answer
    C. Stealth virus
    Explanation
    A stealth virus is a type of virus that is designed to hide itself and make it difficult for antivirus software to detect its presence. It achieves this by modifying its code or behavior in order to avoid detection. This type of virus can be particularly dangerous as it can infect a system without being detected and can continue to spread and cause harm without the user's knowledge.

    Rate this question:

  • 15. 

    A newer type of computer virus created for the purpose of using a computer for malicious purposes. Once a computer is infected, a third party with a malicious intent can manipulate the computer and cause serious damage.

    • A.

      Spyware

    • B.

      Malware

    • C.

      Worm

    • D.

      BOT

    Correct Answer
    D. BOT
    Explanation
    A BOT is a type of computer virus that is specifically designed to infect a computer and allow a third party to control it for malicious purposes. Once a computer is infected with a BOT, the attacker can manipulate the computer and cause significant harm. Unlike other types of viruses, a BOT is created with the intention of remote control and manipulation rather than simply causing damage or stealing information.

    Rate this question:

  • 16. 

    The act of sending email as if it were from an actual corporation or organization to obtain the personal credit information of the recepient such as credit card numbers, IDs and passwords.

    • A.

      Cross-site scripting

    • B.

      Email bombs

    • C.

      Denial of Service

    • D.

      Phishing

    Correct Answer
    D. Phishing
    Explanation
    Phishing refers to the act of sending emails that impersonate legitimate corporations or organizations in order to deceive recipients into providing their personal credit information, such as credit card numbers, IDs, and passwords. This is typically done through fraudulent emails that appear to be from trusted sources, tricking recipients into disclosing sensitive information.

    Rate this question:

  • 17. 

    An attack with an attempt to disable the functions of a mail server by sending a large amount of email to overload a server

    • A.

      Email bomb

    • B.

      Phishing

    • C.

      Denial of service

    • D.

      Buffer overflow

    Correct Answer
    A. Email bomb
    Explanation
    An email bomb is an attack where a large number of emails are sent to a mail server in an attempt to overwhelm and disable its functions. This is achieved by flooding the server with a high volume of incoming emails, causing it to become overloaded and unable to handle legitimate requests. This type of attack can disrupt email communication and cause significant inconvenience or damage to the targeted server and its users.

    Rate this question:

  • 18. 

    The process of scanning a computer to look for open port numbers

    • A.

      Virus scan

    • B.

      Port scan

    • C.

      Password crack

    • D.

      Security hole

    Correct Answer
    B. Port scan
    Explanation
    A port scan is the process of scanning a computer to look for open port numbers. This is done to identify any potential vulnerabilities or security holes in the system. By scanning the ports, an attacker can determine which ports are open and potentially exploit them to gain unauthorized access or launch an attack. Therefore, the correct answer is port scan.

    Rate this question:

  • 19. 

    A form of password cracking that involves analysis in combination with a file which comprises a large list of descriptions of candidate user names and passwords.

    • A.

      Dictionary attack

    • B.

      Password attack

    • C.

      Buffer overflow attack

    • D.

      Distributed denial-of-service

    Correct Answer
    A. Dictionary attack
    Explanation
    A dictionary attack is a form of password cracking where a large list of candidate user names and passwords is used for analysis. This method involves systematically trying each entry in the list until a match is found, allowing unauthorized access to an account. Unlike a brute force attack that tries all possible combinations, a dictionary attack uses a predefined set of commonly used passwords and words from dictionaries, making it more efficient. This technique takes advantage of the fact that many people use weak passwords or common words, making it easier to guess or crack their passwords.

    Rate this question:

  • 20. 

    A form of password cracking which involves analysis in combination with a program that generates random character strings

    • A.

      Dictionary attack

    • B.

      Password attack

    • C.

      Buffer overflow attack

    • D.

      Brute force attack

    Correct Answer
    D. Brute force attack
    Explanation
    A brute force attack is a form of password cracking that involves using a program to generate random character strings and then analyzing them to find the correct password. This method is time-consuming and resource-intensive, as it systematically tries every possible combination until the correct password is found. It is often used when other methods, such as a dictionary attack or password attack, are not successful in cracking the password.

    Rate this question:

  • 21. 

    Type of virus by symptoms that causes destruction to the OS as the basic software, or causes destruction to application software.

    • A.

      Data destruction

    • B.

      Program destruction

    • C.

      Screen display destruction

    • D.

      Specific date/time message output

    Correct Answer
    B. Program destruction
    Explanation
    This answer is correct because program destruction refers to a type of virus that causes destruction to application software or the operating system. This type of virus is designed to corrupt or delete programs, leading to the malfunctioning or complete breakdown of the software. It can cause significant damage to the system and may require reinstalling or repairing the affected programs or operating system to resolve the issue.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 07, 2011
    Quiz Created by
    Jeanoculam
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.