1.
What does information security do?
Correct Answer
B. Protects the network and information systems
Explanation
Information security is responsible for safeguarding the network and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. It involves implementing various measures, such as firewalls, encryption, access controls, and security policies, to protect sensitive data and ensure the confidentiality, integrity, and availability of information. By protecting the network and information systems, information security helps prevent data breaches, cyber-attacks, and other security incidents that could compromise the confidentiality, integrity, and availability of information.
2.
Why is information security important?
Correct Answer
D. All of the above
Explanation
Information security is important for several reasons. Firstly, it supports and protects critical business processes and systems, ensuring the smooth functioning of operations and preventing any disruptions or damages. Secondly, it helps organizations avoid potential fines that may be imposed due to data breaches or non-compliance with security regulations. Lastly, information security is crucial in protecting employee and citizen data, safeguarding their privacy and preventing any unauthorized access or misuse. Therefore, all of the given options are valid reasons why information security is important.
3.
Information Security is the responsibility of:
Correct Answer
B. All employees.
Explanation
Information security is the responsibility of all employees because every individual within an organization plays a role in safeguarding sensitive information. It is not limited to a specific department or a select group of employees. All staff members need to be aware of security protocols, follow best practices, and actively participate in protecting data from unauthorized access, breaches, or misuse. This inclusive approach ensures a collective effort toward maintaining the confidentiality, integrity, and availability of information assets within the organization.
4.
What can I do to reduce potential security threats?
Correct Answer
A. Do not share any passwords.
Explanation
Sharing passwords can increase the risk of potential security threats as it allows unauthorized individuals to access sensitive information or carry out malicious activities. By not sharing passwords, individuals can maintain better control over their accounts and protect their personal and confidential data from being compromised. Turning off virus software or not turning off a computer may have other implications but does not directly address the issue of reducing security threats. Therefore, the correct answer is to not share any passwords.
5.
What is ethical hacking?
Correct Answer
D. None of the above
Explanation
Ethical hacking, also known as penetration testing or white-hat hacking, refers to the authorized and legal practice of intentionally probing computer systems, networks, or applications for security vulnerabilities. The purpose of ethical hacking is to identify and fix potential weaknesses in a system's defenses. It is conducted by skilled professionals with the explicit permission of the organization or system owner. Ethical hacking is a proactive approach to cybersecurity, helping organizations strengthen their security measures by identifying and addressing vulnerabilities before malicious hackers can exploit them. Therefore, it is not an unauthorized or unethical activity.
6.
What is a virus in a computer?
Correct Answer
A. A type of malicious software
Explanation
A virus in a computer refers to a type of malicious software that is designed to replicate itself and spread to other computers. It is capable of causing harm to the system by corrupting or deleting files, stealing personal information, or disrupting the normal functioning of the computer. Viruses are often spread through infected emails, downloads, or websites, and can be a significant threat to computer security.
7.
How does a Le-Hard virus come into existence?
Correct Answer
D. Command.Com
Explanation
A Le-Hard virus comes into existence through the Command.Com program. Command.Com is a command interpreter for MS-DOS and Windows operating systems. It is responsible for executing commands and running programs on the computer. Therefore, if a Le-Hard virus is created, it would likely exploit vulnerabilities or manipulate the Command.Com program to spread and infect other files or systems.
8.
Where can one find the company process for Business Continuity Management?
Correct Answer
C. In iQMS Wik
Explanation
The company process for Business Continuity Management can be found in iQMS Wik.
9.
What type of password should one create?
Correct Answer
A. A combination of letters, numbers, and symbols
Explanation
Creating a password that is a combination of letters, numbers, and symbols is recommended because it increases the complexity and strength of the password. This combination makes it harder for potential hackers to guess or crack the password using brute force or dictionary attacks. Including a mix of uppercase and lowercase letters, numbers, and special symbols adds more variability and makes the password more secure against common password-cracking techniques.
10.
What is a term applied to unwanted applications or files that are not classified as malware but can worsen the performance of computers and may cause security risks?
Correct Answer
B. Grayware
Explanation
Grayware is a term applied to unwanted applications or files that are not classified as malware but can still negatively impact the performance of computers and pose security risks. Unlike malware or viruses, grayware may not have malicious intent but can still cause issues such as slowing down the system or collecting personal information without the user's consent. Therefore, grayware is an appropriate term for describing these potentially harmful but not explicitly malicious applications or files.
11.
What is the name of the first boot sector virus?
Correct Answer
B. Brain
Explanation
The correct answer is "Brain." Brain is the name of the first boot sector virus. It was created in 1986 by two brothers from Pakistan. The virus infected the boot sector of floppy disks, making it the first known virus to target this area. Brain spread through infected disks and caused various issues on infected computers, such as slowing down the system and corrupting data. It marked the beginning of a new era in computer viruses and highlighted the need for antivirus software.
12.
Phishing by text message is called ____________.
Correct Answer
A. Smishing
Explanation
Phishing by text message is called smishing. This term is a combination of "SMS" (Short Message Service) and "phishing." Smishing involves sending fraudulent text messages that appear to be from a legitimate source, such as a bank or a company, in order to trick individuals into revealing personal information or clicking on malicious links. It is a form of social engineering that exploits the trust people have in text messages to deceive and manipulate them.