Information Security Quiz: Ultimate Exam!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Vadnaisk
V
Vadnaisk
Community Contributor
Quizzes Created: 1 | Total Attempts: 6,851
Questions: 11 | Attempts: 6,857

SettingsSettingsSettings
Information Security Quiz: Ultimate Exam! - Quiz

.


Questions and Answers
  • 1. 

    Which of the following is the definition of a computer worm?  

    • A.

      A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.

    • B.

      A standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. It does not need to attach itself to an existing program.

    • C.

      A program designed to breach the security of a computer system while ostensibly performing some innocuous function.

    • D.

      A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages.

    Correct Answer
    B. A standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. It does not need to attach itself to an existing program.
    Explanation
    Answer 1 - This is a computer virus Answer 2 - This is a computer worm Answer 3 - This is a trojan horse Answer 4 - This is a botnet

    Rate this question:

  • 2. 

    What is the name of the software developed jointly by the US and Israel that damaged almost one-fifth of Iran's nuclear centrifuges in 2010? 

    • A.

      Duqu

    • B.

      Flame

    • C.

      Conficker

    • D.

      Stuxnet

    Correct Answer
    D. Stuxnet
    Explanation
    The worm was delivered through a usb thumb drive onto a workers computer. Be careful about plugging in unknown devices onto your personal systems.

    Rate this question:

  • 3. 

    According to the 2014 Ponemon report on data breaches in the United States, the average cost per record lost during a data breach to an organization:

    • A.

      $50

    • B.

      $100

    • C.

      $200

    • D.

      $300

    Correct Answer
    C. $200
    Explanation
    According to this year’s benchmark findings, data breaches cost companies an average of $201 per compromised record – of which $134 pertains to indirect costs including abnormal turnover or churn of customers. Last year’s average per capita cost was $188 with an average indirect cost of $128. The highest cost of $214 per compromised record occurred in 2011.

    Rate this question:

  • 4. 

    According to the Freedom and Information and Privacy (FOIP) legislation in Alberta, the University is authorized to collect personal information about you from outside sources such as tax and health records without your consent?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The legislation states that, subject to some limited exceptions, a public body must collect personal information directly from the individual the information is about.

    Rate this question:

  • 5. 

    Which of the following fields are mandatory in the University of Lethbridge password change form?

    • A.

      One or more Lower Case Letters

    • B.

      One or more Upper Case Letters

    • C.

      One or more Numeric Digit

    • D.

      One or more Punctuation / Symbol chars

    • E.

      Eight or more Characters long

    • F.

      No 3 character Repeats or Sequences

    • G.

      No 4 character Keyboard Sequences

    • H.

      No 4 character Personal Data Sequences

    Correct Answer(s)
    E. Eight or more Characters long
    F. No 3 character Repeats or Sequences
    G. No 4 character Keyboard Sequences
    H. No 4 character Personal Data Sequences
    Explanation
    But 3 of the 4 other boxes must be satisfied in order to accept a given password.

    Rate this question:

  • 6. 

    What does the University of Lethbridge Password standard state is the acceptable timeframe for the life of your password?

    • A.

      90 days

    • B.

      6 months

    • C.

      1 year

    • D.

      No expiration date on passwords

    Correct Answer
    C. 1 year
    Explanation
    To see the password standard, visit our policy page at http://www.uleth.ca/policy

    Rate this question:

  • 7. 

    It is recommended to reuse your password on multiple sites to make it easier to remember.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Reusing passwords on multiple sites is not recommended as it poses a significant security risk. If one site gets hacked and your password is compromised, the attacker would have access to all other accounts using the same password. It is advisable to use unique, strong passwords for each site to enhance security and protect personal information.

    Rate this question:

  • 8. 

    It is ok to share my password with

    • A.

      Spouse/Partner

    • B.

      Children

    • C.

      Help Desk Staff

    • D.

      Co-workers or administrative assistants

    • E.

      Friends

    • F.

      Nobody

    Correct Answer
    F. Nobody
    Explanation
    Sharing your password violates the password standard and is generally a really bad idea.

    Rate this question:

  • 9. 

    A phishing attack, or a communication asking a user to reveal their username and password to an attacker can direct a user to

    • A.

      Reply via email

    • B.

      Open a webpage to enter information

    • C.

      Open a file and send to a different location

    • D.

      Provide sensitive information over the phone

    Correct Answer(s)
    A. Reply via email
    B. Open a webpage to enter information
    C. Open a file and send to a different location
    D. Provide sensitive information over the pHone
    Explanation
    Phishing can take on many forms. Do not give your username or password to anyone, through any form of communication. Any competent IT organization will not require this information to help you with your issues.

    Rate this question:

  • 10. 

    In the address portion of a website, what prefix indicates your communications are being encrypted during transit.

    • A.

      Http://

    • B.

      Https://

    • C.

      Ftp://

    • D.

      Tcp://

    Correct Answer
    B. Https://
    Explanation
    https usually accompanied by a lock symbol in the address bar indicates your communication session is encrypted. That doesn't mean your totally safe but reduces your risk of information disclosure.

    Rate this question:

  • 11. 

    The recent Sandworm malware, distributed by Russian hackers, takes advantage of a zero-day vulnerability (an unpatched flaw in software), in which Microsoft Office Product

    • A.

      Microsoft Word

    • B.

      Microsoft Excel

    • C.

      Microsoft Powerpoint

    • D.

      Microsoft Outlook

    Correct Answer
    C. Microsoft Powerpoint
    Explanation
    The malware travels in a Powerpoint file that refers to an.INF file, where INF is the Windows extension given to a special sort of information file used during software setup. This pulls down additional malware from the internet to steal data, or infect other computers on your network.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 15, 2014
    Quiz Created by
    Vadnaisk
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.