Quiz 1 Dfs4143

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Syamazs
S
Syamazs
Community Contributor
Quizzes Created: 1 | Total Attempts: 3,094
Questions: 10 | Attempts: 3,094

SettingsSettingsSettings
Quiz 1 Dfs4143 - Quiz

.


Questions and Answers
  • 1. 

    In computer security, ……………………. means that computer system assets can be modified only by authorized parities.

    • A.

      Confidentiality

    • B.

       Integrity

    • C.

      Availability

    • D.

      Authenticity

    Correct Answer
    B.  Integrity
    Explanation
    Integrity in computer security refers to the concept that computer system assets can be modified only by authorized parties. This means that the data and information within the system remain intact and accurate, and any changes made to them are done so by individuals who have the proper authorization. Ensuring integrity helps prevent unauthorized modifications, tampering, or corruption of data, ensuring the reliability and trustworthiness of the system.

    Rate this question:

  • 2. 

     In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities.

    • A.

      Confidentiality

    • B.

      Integrity

    • C.

      Authenticity

    • D.

      Availability

    Correct Answer
    A. Confidentiality
    Explanation
    Confidentiality refers to the protection of information in a computer system, ensuring that it can only be accessed by authorized parties for reading purposes. This means that sensitive data remains private and secure, preventing unauthorized individuals from accessing or viewing it. Confidentiality is an essential aspect of computer security to maintain the privacy and integrity of information.

    Rate this question:

  • 3. 

    State whether true of false. i) A worm mails a copy of itself to other systems. ii) A worm executes a copy of itself on another system

    • A.

      True, False

    • B.

      False, True

    • C.

      True, True

    • D.

      False, False

    Correct Answer
    C. True, True
    Explanation
    The given answer is True, True. A worm is a type of malicious software that is capable of self-replicating and spreading to other systems. It can do this by either mailing a copy of itself to other systems (as mentioned in statement i) or by executing a copy of itself on another system (as mentioned in statement ii). Therefore, both statements are true and the answer is True, True.

    Rate this question:

  • 4. 

    A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs.

    • A.

      Worm

    • B.

      Virus

    • C.

      Zombie

    • D.

      Trap doors

    Correct Answer
    B. Virus
    Explanation
    A virus is a program that can infect other programs by modifying them, including a copy of the virus program. This copy can then go on to infect other programs, creating a chain reaction of infection. Unlike worms, which are standalone programs that can replicate and spread independently, viruses require a host program to infect and spread. Zombies are computers that have been infected and controlled by a remote attacker, while trap doors are hidden vulnerabilities in a system that can be exploited for unauthorized access.

    Rate this question:

  • 5. 

    Which of the following is independent malicious program that need not any host program?

    • A.

      Trap doors

    • B.

      Trojan horse

    • C.

      Virus

    • D.

      Worm

    Correct Answer
    D. Worm
    Explanation
    A worm is an independent malicious program that can spread itself across computer networks without the need for a host program. Unlike viruses, which require a host file to attach themselves to, worms are stand-alone programs that can replicate and spread on their own. They can exploit vulnerabilities in computer systems to gain unauthorized access and carry out malicious activities, such as stealing sensitive information or causing system damage. Therefore, the correct answer is Worm.

    Rate this question:

  • 6. 

    The following security threats are very rare:

    • A.

      Natural disasters.

    • B.

      Explosions.

    • C.

      Blackouts.

    • D.

      Subversive employees.

    Correct Answer
    B. Explosions.
    Explanation
    Explosions are considered rare security threats because they are not commonly encountered in most environments. While natural disasters, blackouts, and subversive employees are potential security risks that can occur more frequently, explosions are less likely to happen. They require specific circumstances such as the presence of explosive materials or intentional acts of sabotage. Therefore, explosions are not as commonly considered security threats compared to the other options listed.

    Rate this question:

  • 7. 

    The following are the goals of network security, except;

    • A.

      Threat assessment.

    • B.

      Risk assessment.

    • C.

      Asset Identification.

    • D.

      Confidentiality.

    Correct Answer
    D. Confidentiality.
    Explanation
    The goals of network security include threat assessment, risk assessment, and asset identification. These goals aim to identify and assess potential threats and risks to the network, as well as identify and protect valuable assets. However, confidentiality is not listed as one of the goals. While confidentiality is an important aspect of network security, it is not specifically mentioned in the given options.

    Rate this question:

  • 8. 

    The goal of ______________ is to reduce the exposure of the organization to malicious code.        

    • A.

      Access control.

    • B.

      Anti-virus

    • C.

      Password.

    • D.

      None of the above.

    Correct Answer
    B. Anti-virus
    Explanation
    The goal of anti-virus is to reduce the exposure of the organization to malicious code. Anti-virus software is designed to detect, prevent, and remove computer viruses, malware, and other malicious software from infecting computer systems. By regularly scanning and monitoring the system, anti-virus software helps to identify and eliminate any potential threats, thereby reducing the organization's vulnerability to malicious code.

    Rate this question:

  • 9. 

     Imagine the status/service of a bank if its customers are unable to make transactions using their accounts .This scenario refers to what goals of network security.         

    • A.

      Authenticity

    • B.

      Availability.

    • C.

      Integrity.

    • D.

      Confidentiality.

    Correct Answer
    B. Availability.
    Explanation
    The scenario described in the question refers to the goal of network security known as availability. Availability ensures that authorized users have access to the network and its resources when needed. In this case, if customers are unable to make transactions using their accounts, it means that the network or its services are not available to them. This could be due to various reasons such as network outages, system failures, or cyber attacks. Therefore, ensuring the availability of the network is crucial for maintaining the functionality and usability of the bank's services.

    Rate this question:

  • 10. 

    Identify which of the following is not a potential risk to the network security.

    • A.

      Email Attachments.

    • B.

      Anti-virus Protection.

    • C.

      Blended Attacks

    • D.

      Renaming Documents.

    Correct Answer
    B. Anti-virus Protection.
    Explanation
    The correct answer is Anti-virus Protection. While email attachments, blended attacks, and renaming documents can all pose potential risks to network security, anti-virus protection is actually a measure taken to mitigate these risks. Anti-virus software is designed to detect, prevent, and remove malicious software, such as viruses, worms, and Trojans, which can compromise network security. Therefore, it is not considered a potential risk, but rather a protective measure.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 22, 2018
    Quiz Created by
    Syamazs
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.