1.
TLS offers stronger protection than SSL. True or false?
Correct Answer
A. True
Explanation
TLS (Transport Layer Security) is the successor of SSL (Secure Sockets Layer) and offers stronger protection for data transmission over the internet. TLS uses more secure encryption algorithms and protocols, providing better security against eavesdropping, data tampering, and other attacks. It also offers improved authentication mechanisms and supports the latest security standards. Therefore, it is correct to say that TLS offers stronger protection than SSL.
2.
Nonrepudiation
provides undeniable evidence that a specific action occurred. True or false?
Correct Answer
A. True
Explanation
Nonrepudiation refers to the ability to prove that a specific action occurred and cannot be denied. It ensures that the parties involved in a transaction or communication cannot later deny their involvement or the authenticity of the action. Therefore, the statement that nonrepudiation provides undeniable evidence that a specific action occurred is true.
3.
A
“secure by default” operating system does not have any vulnerabilities. True or false?
Correct Answer
B. False
Explanation
The statement "A 'secure by default' operating system does not have any vulnerabilities" is false. No operating system is completely immune to vulnerabilities, as new vulnerabilities can always be discovered and exploited. While a "secure by default" operating system may have strong security measures in place, it is still possible for vulnerabilities to exist and be exploited. Therefore, it is incorrect to say that such an operating system does not have any vulnerabilities.
4.
The
more stringent a security policy is, the less likely it is that users will
attempt to circumvent it. True or false?
Correct Answer
B. False
Explanation
The explanation for the answer "False" is that the more stringent a security policy is, the more likely it is that users will attempt to circumvent it. When security measures become too strict or burdensome, users may feel frustrated or inconvenienced, leading them to find ways to bypass or work around the policy. This can include finding loopholes, using unauthorized methods, or seeking assistance from others to bypass the security measures in place. Therefore, a more stringent security policy may actually increase the likelihood of users attempting to circumvent it.
5.
It is easy for an organization to achieve
compliance with ISO 17799. True or
false?
Correct Answer
B. False
Explanation
Achieving compliance with ISO 17799 is not easy for an organization. ISO 17799 is a set of information security standards that requires organizations to establish and maintain a comprehensive security management system. It involves implementing various controls and measures to protect information assets, manage risks, and ensure compliance with legal and regulatory requirements. Achieving compliance with ISO 17799 requires significant effort, resources, and commitment from the organization. Therefore, the statement that it is easy for an organization to achieve compliance with ISO 17799 is false.
6.
Which of the following involves prevention of
unauthorized withholding of information or resources?
Correct Answer
C. Availability
Explanation
Availability involves ensuring that information or resources are accessible and usable when needed. It focuses on preventing unauthorized withholding of information or resources, ensuring that they are readily available to authorized users. This can include measures such as implementing backups, redundancy, and disaster recovery plans to ensure that systems and data remain accessible even in the event of a failure or attack.
7.
Protecting
personal data involves which of the following?
Correct Answer
B. Privacy
Explanation
Protecting personal data involves privacy. Privacy refers to the right of individuals to control the collection, use, and disclosure of their personal information. It ensures that personal data is kept confidential and not shared without consent. Privacy measures include implementing security measures, obtaining consent for data collection, and providing individuals with the option to access and correct their personal information. By prioritizing privacy, organizations can safeguard personal data and maintain the trust of their customers or users.
8.
Which
type of attack involves intercepting and modifying packets of data on a
network?
Correct Answer
B. Man-in-the middle attack
Explanation
A man-in-the-middle attack involves an attacker intercepting and modifying packets of data on a network. In this type of attack, the attacker positions themselves between the sender and receiver of the data, allowing them to intercept and modify the communication. This can be done by exploiting vulnerabilities in the network or by using techniques like ARP spoofing. The attacker can then modify the data or even impersonate one of the parties involved, leading to unauthorized access, data theft, or other malicious activities.