1.
What are the three main objectives of information security?
2.
Differentiates between a Hacker and an Attacker
3.
Differentiate between Distributed Denial of Service and Denial of Service
4.
- Give example for each sources of threats:
-
- Internal threats
- External
- Structured
- Unstructured
5.
Explain data wiping, hard disk destruction and hard drive recycling
6.
Definition of Information security
7.
Describe types of Threats.
8.
Find the meaning of the terms:
-
- Phishing
- Sniffing
- Vishing
9.
"The practice and precautions taken to protect valuable information from the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction unauthorized access, recording, disclosure or destruction"
Correct Answer
C. Information Security
Explanation
The given statement describes the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure, or destruction. This is the definition of information security, which focuses on safeguarding sensitive data and ensuring its confidentiality, integrity, and availability. Network security, database security, and physical security are all related to information security but do not encompass the entire scope of protecting valuable information. Therefore, the correct answer is Information Security.
10.
From the options below, which of them is not a threat to information security?
Correct Answer
D. Unchanged default password
Explanation
An unchanged default password refers to the use of the default password that comes with a system or device, without changing it to a unique and secure password. This can pose a threat to information security as it makes it easier for unauthorized individuals to gain access to the system or device. They can potentially exploit this vulnerability to steal or manipulate sensitive information. Therefore, an unchanged default password is indeed a threat to information security.
11.
From the options below, which of them is not a vulnerability to information security?
Correct Answer
A. Flood
Explanation
A flood is not a vulnerability to information security. A flood refers to a natural disaster where an area is submerged in water, causing damage to physical infrastructure. While a flood can potentially damage hardware and disrupt operations, it is not directly related to information security vulnerabilities such as data breaches, unauthorized access, or software vulnerabilities.
12.
Which of the following information security technology is used for avoiding browser-based hacking?
Correct Answer
B. Remote browser access
Explanation
Remote browser access is a technology used for avoiding browser-based hacking. It allows users to access a web browser on a remote server, which helps in keeping the user's local machine secure from any potential attacks. By using remote browser access, the user's browsing activities are performed on a remote server, and only the rendered display is transmitted to the user's device, thus minimizing the risk of browser-based hacking.
13.
Compromising confidential information comes under
Correct Answer
B. Threat
Explanation
Compromising confidential information is considered a threat because it poses a risk to the confidentiality of sensitive data. A threat refers to any potential danger or harm that can exploit vulnerabilities and cause damage to an organization's assets or interests. In this case, the act of compromising confidential information can lead to unauthorized access, data breaches, or the misuse of sensitive data, making it a significant threat to the security and privacy of individuals or organizations.
14.
Lack of access control policy is a
Correct Answer
C. Vulnerability
Explanation
The correct answer is "Vulnerability" because a lack of access control policy refers to a weakness or flaw in a system's security measures that allows unauthorized individuals to gain access to sensitive information or resources. It is considered a vulnerability because it exposes the system to potential threats and attacks, making it easier for attackers to exploit the system's weaknesses and compromise its integrity.
15.
All of the following are examples of real security and privacy threats except:
Correct Answer
C. Spam
Explanation
Spam is not considered a security or privacy threat because it is mainly unsolicited and unwanted emails or messages. While spam can be annoying and time-consuming, it does not typically pose a direct risk to the security or privacy of an individual or organization. On the other hand, hackers, viruses, and worms are all examples of real security and privacy threats. Hackers can gain unauthorized access to systems, viruses can infect and damage files or software, and worms can spread rapidly through networks, causing disruptions and potential data breaches.
16.
Trojan horses are very similar to virus in the matter that they are computer programs that replicate copies of themselves
Correct Answer
B. False
Explanation
Trojan horses are not similar to viruses in the sense that they do not replicate copies of themselves. While viruses are self-replicating programs that can spread and infect other files, Trojan horses are deceptive programs that disguise themselves as legitimate software but carry out malicious activities once installed on a computer. Unlike viruses, Trojan horses do not have the ability to replicate and spread on their own.
17.
Monitors user activity on internet and transmit that information in the background to someone else
Correct Answer
B. Spyware
Explanation
Spyware is a type of malicious software that secretly monitors a user's activity on the internet and transmits that information to someone else without the user's knowledge or consent. It is designed to gather sensitive information such as passwords, credit card details, browsing habits, and personal data. Unlike adware, which displays unwanted advertisements, spyware operates covertly and focuses on gathering information. Therefore, the correct answer is Spyware.
18.
Viruses are
Correct Answer
A. Man made
Explanation
The answer "Man made" suggests that viruses are created or engineered by humans. This implies that viruses do not naturally occur in nature, nor are they created by machines. The term "man made" implies that viruses are a result of human intervention or manipulation, possibly for various purposes such as scientific research or biological warfare.
19.
When the firm's purpose for their information infrastructure is to make its data and information available to those who are authorized to use it, the firm is seeking the objective of:
Correct Answer
B. Availability
Explanation
The firm's purpose for their information infrastructure is to make its data and information available to those who are authorized to use it. This means that the firm wants to ensure that the data and information can be accessed and used by the authorized individuals whenever they need it. Therefore, the objective that the firm is seeking in this case is availability.
20.
Which type of threat cannot replicate itself within a system, but can transmit its copies by means of e-mail?
Correct Answer
C. Worm
Explanation
A worm is a type of threat that cannot replicate itself within a system, but it can transmit its copies by means of e-mail. Unlike viruses, which need a host file to attach themselves to, worms are standalone programs that can spread independently through networks and email attachments. They can self-replicate and spread to other systems, causing damage and disruption. Therefore, a worm fits the description provided in the question.