Revision Topic 1: Introduction To Security

20 Questions | Total Attempts: 29

SettingsSettingsSettings
Please wait...
Revision Topic 1: Introduction To Security


Questions and Answers
  • 1. 
    What are the three main objectives of information security?
  • 2. 
    Differentiates between a Hacker and an Attacker
  • 3. 
    Differentiate between Distributed Denial of Service and Denial of Service
  • 4. 
    1. Give example for each sources of threats:
      1. Internal threats
      2. External
      3. Structured
      4. Unstructured
  • 5. 
    Explain data wiping, hard disk destruction and hard drive recycling
  • 6. 
    Definition of Information security
  • 7. 
    Describe types of Threats.
  • 8. 
    Find the meaning of the terms:
      1. Phishing
      2. Sniffing
      3. Vishing
  • 9. 
    "The practice and precautions taken to protect valuable information from the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction unauthorized access, recording, disclosure or destruction"
    • A. 

      Network Security

    • B. 

      Database Security

    • C. 

      Information Security

    • D. 

      Physical Security

    • E. 

      Option 5

  • 10. 
    From the options below, which of them is not a threat to information security?
    • A. 

      Disaster

    • B. 

      Eavesdropping

    • C. 

      Information leakage

    • D. 

      Unchanged default password

    • E. 

      Option 5

  • 11. 
    From the options below, which of them is not a vulnerability to information security?
    • A. 

      Flood

    • B. 

      Without deleting data, disposal of storage media

    • C. 

      Unchanged default password

    • D. 

      Latest patches and updates not done

  • 12. 
    Which of the following information security technology is used for avoiding browser-based hacking?
    • A. 

      Anti-malware in browsers

    • B. 

      Remote browser access

    • C. 

      Adware remover in browsers

    • D. 

      Incognito mode in a browser

  • 13. 
    Compromising confidential information comes under
    • A. 

      Bug

    • B. 

       Threat

    • C. 

      Vulnerability

    • D. 

      Attack

  • 14. 
    Lack of access control policy is a
    • A. 

      Bug

    • B. 

      Threat

    • C. 

      Vulnerability

    • D. 

      Attack

  • 15. 
    All of the following are examples of real security and privacy threats except:
    • A. 

      Hackers

    • B. 

      Virus

    • C. 

      Spam

    • D. 

      Worm

  • 16. 
    Trojan horses are very similar to virus in the matter that they are computer programs that replicate copies of themselves
    • A. 

      True

    • B. 

      False

    • C. 

      Option 3

    • D. 

      Option 4

    • E. 

      Option 5

  • 17. 
    Monitors user activity on internet and transmit that information in the background to someone else
    • A. 

      Malware

    • B. 

      Spyware

    • C. 

      Adware

    • D. 

      None of these

  • 18. 
    Viruses are
    • A. 

      Man made

    • B. 

      Naturally occur

    • C. 

      Machine made

    • D. 

      Natural made

  • 19. 
    When the firm's purpose for their information infrastructure is to make its data and information available to those who are authorized to use it, the firm is seeking the objective of:
    • A. 

      Confidentiality

    • B. 

      Availability

    • C. 

      Authorization

    • D. 

      Integrity

  • 20. 
    Which type of threat cannot replicate itself within a system, but can transmit its copies by means of e-mail?
    • A. 

      Malware

    • B. 

      Virus

    • C. 

      Worm

    • D. 

      Trojan horse

    • E. 

      Option 5

Back to Top Back to top