Quiz 1 Dfs4143

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Syamazs
S
Syamazs
Community Contributor
Quizzes Created: 1 | Total Attempts: 3,145
| Attempts: 3,145 | Questions: 10
Please wait...
Question 1 / 10
0 %
0/100
Score 0/100
1. A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs.

Explanation

A virus is a program that can infect other programs by modifying them, including a copy of the virus program. This copy can then go on to infect other programs, creating a chain reaction of infection. Unlike worms, which are standalone programs that can replicate and spread independently, viruses require a host program to infect and spread. Zombies are computers that have been infected and controlled by a remote attacker, while trap doors are hidden vulnerabilities in a system that can be exploited for unauthorized access.

Submit
Please wait...
About This Quiz
Quiz 1 Dfs4143 - Quiz

QUIZ 1 DFS4143 explores key concepts in cybersecurity, assessing knowledge on data integrity, confidentiality, and threats like worms and viruses. It is designed to test understanding of system... see moresecurity and threat management, crucial for anyone studying or working in IT security. see less

2. The goal of ______________ is to reduce the exposure of the organization to malicious code.        

Explanation

The goal of anti-virus is to reduce the exposure of the organization to malicious code. Anti-virus software is designed to detect, prevent, and remove computer viruses, malware, and other malicious software from infecting computer systems. By regularly scanning and monitoring the system, anti-virus software helps to identify and eliminate any potential threats, thereby reducing the organization's vulnerability to malicious code.

Submit
3.  Imagine the status/service of a bank if its customers are unable to make transactions using their accounts .This scenario refers to what goals of network security.         

Explanation

The scenario described in the question refers to the goal of network security known as availability. Availability ensures that authorized users have access to the network and its resources when needed. In this case, if customers are unable to make transactions using their accounts, it means that the network or its services are not available to them. This could be due to various reasons such as network outages, system failures, or cyber attacks. Therefore, ensuring the availability of the network is crucial for maintaining the functionality and usability of the bank's services.

Submit
4.  In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities.

Explanation

Confidentiality refers to the protection of information in a computer system, ensuring that it can only be accessed by authorized parties for reading purposes. This means that sensitive data remains private and secure, preventing unauthorized individuals from accessing or viewing it. Confidentiality is an essential aspect of computer security to maintain the privacy and integrity of information.

Submit
5. In computer security, ……………………. means that computer system assets can be modified only by authorized parities.

Explanation

Integrity in computer security refers to the concept that computer system assets can be modified only by authorized parties. This means that the data and information within the system remain intact and accurate, and any changes made to them are done so by individuals who have the proper authorization. Ensuring integrity helps prevent unauthorized modifications, tampering, or corruption of data, ensuring the reliability and trustworthiness of the system.

Submit
6. State whether true of false. i) A worm mails a copy of itself to other systems. ii) A worm executes a copy of itself on another system

Explanation

The given answer is True, True. A worm is a type of malicious software that is capable of self-replicating and spreading to other systems. It can do this by either mailing a copy of itself to other systems (as mentioned in statement i) or by executing a copy of itself on another system (as mentioned in statement ii). Therefore, both statements are true and the answer is True, True.

Submit
7. Identify which of the following is not a potential risk to the network security.

Explanation

The correct answer is Anti-virus Protection. While email attachments, blended attacks, and renaming documents can all pose potential risks to network security, anti-virus protection is actually a measure taken to mitigate these risks. Anti-virus software is designed to detect, prevent, and remove malicious software, such as viruses, worms, and Trojans, which can compromise network security. Therefore, it is not considered a potential risk, but rather a protective measure.

Submit
8. Which of the following is independent malicious program that need not any host program?

Explanation

A worm is an independent malicious program that can spread itself across computer networks without the need for a host program. Unlike viruses, which require a host file to attach themselves to, worms are stand-alone programs that can replicate and spread on their own. They can exploit vulnerabilities in computer systems to gain unauthorized access and carry out malicious activities, such as stealing sensitive information or causing system damage. Therefore, the correct answer is Worm.

Submit
9. The following security threats are very rare:

Explanation

Explosions are considered rare security threats because they are not commonly encountered in most environments. While natural disasters, blackouts, and subversive employees are potential security risks that can occur more frequently, explosions are less likely to happen. They require specific circumstances such as the presence of explosive materials or intentional acts of sabotage. Therefore, explosions are not as commonly considered security threats compared to the other options listed.

Submit
10. The following are the goals of network security, except;

Explanation

The goals of network security include threat assessment, risk assessment, and asset identification. These goals aim to identify and assess potential threats and risks to the network, as well as identify and protect valuable assets. However, confidentiality is not listed as one of the goals. While confidentiality is an important aspect of network security, it is not specifically mentioned in the given options.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 22, 2018
    Quiz Created by
    Syamazs
Cancel
  • All
    All (10)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A ………….. is a program that can infect...
The goal of ______________ is to reduce the exposure of the...
 Imagine the status/service of a bank if its customers are unable...
 In computer security,...
In computer security,...
State whether true of false. ...
Identify which of the following is not a potential risk to the...
Which of the following is independent malicious program that need...
The following security threats are very rare:
The following are the goals of network security, except;
Alert!

Advertisement