Quiz 1 Dfs4143

10 Questions | Total Attempts: 2354

SettingsSettingsSettings
Quiz 1 Dfs4143 - Quiz

.


Questions and Answers
  • 1. 
    In computer security, ……………………. means that computer system assets can be modified only by authorized parities.
    • A. 

      Confidentiality

    • B. 

       Integrity

    • C. 

      Availability

    • D. 

      Authenticity

  • 2. 
     In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities.
    • A. 

      Confidentiality

    • B. 

      Integrity

    • C. 

      Authenticity

    • D. 

      Availability

  • 3. 
    State whether true of false. i) A worm mails a copy of itself to other systems. ii) A worm executes a copy of itself on another system
    • A. 

      True, False

    • B. 

      False, True

    • C. 

      True, True

    • D. 

      False, False

  • 4. 
    A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs.
    • A. 

      Worm

    • B. 

      Virus

    • C. 

      Zombie

    • D. 

      Trap doors

  • 5. 
    Which of the following is independent malicious program that need not any host program?
    • A. 

      Trap doors

    • B. 

      Trojan horse

    • C. 

      Virus

    • D. 

      Worm

  • 6. 
    The following security threats are very rare:
    • A. 

      Natural disasters.

    • B. 

      Explosions.

    • C. 

      Blackouts.

    • D. 

      Subversive employees.

  • 7. 
    The following are the goals of network security, except;
    • A. 

      Threat assessment.

    • B. 

      Risk assessment.

    • C. 

      Asset Identification.

    • D. 

      Confidentiality.

  • 8. 
    The goal of ______________ is to reduce the exposure of the organization to malicious code.        
    • A. 

      Access control.

    • B. 

      Anti-virus

    • C. 

      Password.

    • D. 

      None of the above.

  • 9. 
     Imagine the status/service of a bank if its customers are unable to make transactions using their accounts .This scenario refers to what goals of network security.         
    • A. 

      Authenticity

    • B. 

      Availability.

    • C. 

      Integrity.

    • D. 

      Confidentiality.

  • 10. 
    Identify which of the following is not a potential risk to the network security.
    • A. 

      Email Attachments.

    • B. 

      Anti-virus Protection.

    • C. 

      Blended Attacks

    • D. 

      Renaming Documents.