Information Security Session 2 Assessment

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Mschwind
M
Mschwind
Community Contributor
Quizzes Created: 5 | Total Attempts: 2,329
| Attempts: 392 | Questions: 11
Please wait...
Question 1 / 11
0 %
0/100
Score 0/100
1. Trojan horses are software programs that hide their true purpose, and reveal their designed behavior only when activated.

Explanation

Trojan horses are a type of malicious software that deceive users by disguising their true purpose. They appear harmless or useful, but once activated, they reveal their true behavior, which is usually harmful or malicious. This is why they are called "Trojan horses," as they mimic the concept of the Greek myth where a wooden horse appeared harmless but contained hidden soldiers inside. Therefore, the statement that Trojan horses hide their true purpose and only reveal their designed behavior when activated is true.

Submit
Please wait...
About This Quiz
Information Security Session 2 Assessment - Quiz

The 'Information Security Session 2 Assessment' evaluates knowledge on change control, denial-of-service attacks, system vulnerabilities, power issues, and deceptive software like Trojan horses. It's designed to test understanding of essential security protocols and threat mitigation.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. A phreaker is someone who hacks into the public telephone network to make free calls or disrupt services.

Explanation

A phreaker is indeed someone who hacks into the public telephone network to either make free calls or disrupt services. This term originated in the 1970s and was used to describe individuals who exploited vulnerabilities in the phone system to bypass charges or cause disruptions. Phreaking is considered a form of hacking and is illegal in many jurisdictions.

Submit
3. Developers use a process known as change control to ensure that the working system delivered to users represents the intent of the developers.

Explanation

Change control is a process used by developers to manage and track changes made to a system. It ensures that any modifications or updates to the system align with the original intentions of the developers. By implementing change control, developers can maintain the integrity and quality of the working system delivered to users. Therefore, the statement that developers use change control to ensure that the working system represents their intent is true.

Submit
4. Both general management and information technology management are responsible for implementing information security.

Explanation

Both general management and information technology management are responsible for implementing information security because effective information security requires a combination of managerial and technical controls. General management is responsible for setting policies, procedures, and guidelines to ensure that information security is prioritized and integrated into the overall business strategy. Information technology management, on the other hand, is responsible for implementing and maintaining the technical controls necessary to protect the organization's information assets. Therefore, both management functions play a crucial role in ensuring the security of information within an organization.

Submit
5. A ___________________ is an identified weakness in a controlled system, where controls are not present or are no longer effective.

Explanation

A vulnerability refers to a weakness in a controlled system where either controls are not present or they have become ineffective. This means that there is a potential for exploitation or breach of security in the system. It is important to identify and address vulnerabilities in order to maintain the integrity and security of the controlled system.

Submit
6. Unlike any other of the information technology programs, the primary mission of an information security program is to ensure that systems and their contents remain the same.

Explanation

The primary mission of an information security program is indeed to ensure that systems and their contents remain the same. Information security programs are designed to protect the integrity, confidentiality, and availability of information and systems. By implementing various security measures such as access controls, encryption, and monitoring, these programs aim to prevent unauthorized access, alteration, or destruction of data. Therefore, the statement is true.

Submit
7. A _________________________ is when the attacker sends a large number of connection or information requests to a target and the system becomes overloaded and cannot respond to legitimate requests for service.

Explanation

A denial-of-service attack occurs when an attacker floods a target system with a large volume of connection or information requests, overwhelming the system's resources and preventing it from responding to legitimate requests for service. This can effectively disrupt the availability of the targeted system, denying access to legitimate users.

Submit
8. A deliberate act of theft would be:

Explanation

A deliberate act of theft refers to the intentional and unlawful taking of someone's property or information without their permission. Equipment failure, piracy or copyright infringement may involve unauthorized use or access, but they do not necessarily involve the deliberate act of theft. On the other hand, illegal confiscation of equipment or information specifically implies the intentional and unlawful seizure or taking of someone's property or information, making it the correct answer in this context.

Submit
9. When information gatherers employ techniques that cross the threshold of what is legal or ethical, they are conducting ________________________.

Explanation

When information gatherers employ techniques that cross the threshold of what is legal or ethical, they are conducting industrial espionage. This term refers to the practice of gathering confidential information or trade secrets from a competitor or rival company through illegal or unethical means. It involves activities such as hacking, bribery, or theft of proprietary information, with the intention of gaining a competitive advantage. This practice is illegal and unethical because it violates privacy laws and undermines fair competition in the business world.

Submit
10. Information security has more to do with technology than management.

Explanation

This statement is false because information security is not solely dependent on technology. While technology plays a crucial role in implementing security measures, effective information security also requires proper management and organizational practices. This includes creating policies and procedures, conducting risk assessments, training employees, and enforcing security protocols. Without the involvement of management and the implementation of appropriate practices, technology alone cannot ensure information security.

Submit
11. Since a brownout is only a temporary drop in power voltage, no serious damage can come to electrical systems.

Explanation

A brownout is not just a temporary drop in power voltage, but rather a sustained decrease in voltage that can cause serious damage to electrical systems. This can lead to overheating of appliances, damage to sensitive electronic devices, and even electrical fires. Therefore, the statement that no serious damage can come to electrical systems during a brownout is false.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 23, 2009
    Quiz Created by
    Mschwind
Cancel
  • All
    All (11)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Trojan horses are software programs that hide their true purpose, and...
A phreaker is someone who hacks into the public telephone network to...
Developers use a process known as change control to ensure that the...
Both general management and information technology management are...
A ___________________ is an identified weakness in a controlled...
Unlike any other of the information technology programs, the primary...
A _________________________ is when the attacker sends a large number...
A deliberate act of theft would be:
When information gatherers employ techniques that cross the threshold...
Information security has more to do with technology than management.
Since a brownout is only a temporary drop in power voltage, no serious...
Alert!

Advertisement