Revision Topic 1: Introduction To Security

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Officeuse Jtmk
O
Officeuse Jtmk
Community Contributor
Quizzes Created: 1 | Total Attempts: 241
Questions: 20 | Attempts: 241

SettingsSettingsSettings
Revision Topic 1: Introduction To Security - Quiz


Questions and Answers
  • 1. 

    What are the three main objectives of information security?

  • 2. 

    Differentiates between a Hacker and an Attacker

  • 3. 

    Differentiate between Distributed Denial of Service and Denial of Service

  • 4. 

    1. Give example for each sources of threats:
      1. Internal threats
      2. External
      3. Structured
      4. Unstructured

  • 5. 

    Explain data wiping, hard disk destruction and hard drive recycling

  • 6. 

    Definition of Information security

  • 7. 

    Describe types of Threats.

  • 8. 

    Find the meaning of the terms:
      1. Phishing
      2. Sniffing
      3. Vishing

  • 9. 

    "The practice and precautions taken to protect valuable information from the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction unauthorized access, recording, disclosure or destruction"

    • A.

      Network Security

    • B.

      Database Security

    • C.

      Information Security

    • D.

      Physical Security

    • E.

      Option 5

    Correct Answer
    C. Information Security
    Explanation
    The given statement describes the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure, or destruction. This is the definition of information security, which focuses on safeguarding sensitive data and ensuring its confidentiality, integrity, and availability. Network security, database security, and physical security are all related to information security but do not encompass the entire scope of protecting valuable information. Therefore, the correct answer is Information Security.

    Rate this question:

  • 10. 

    From the options below, which of them is not a threat to information security?

    • A.

      Disaster

    • B.

      Eavesdropping

    • C.

      Information leakage

    • D.

      Unchanged default password

    • E.

      Option 5

    Correct Answer
    D. Unchanged default password
    Explanation
    An unchanged default password refers to the use of the default password that comes with a system or device, without changing it to a unique and secure password. This can pose a threat to information security as it makes it easier for unauthorized individuals to gain access to the system or device. They can potentially exploit this vulnerability to steal or manipulate sensitive information. Therefore, an unchanged default password is indeed a threat to information security.

    Rate this question:

  • 11. 

    From the options below, which of them is not a vulnerability to information security?

    • A.

      Flood

    • B.

      Without deleting data, disposal of storage media

    • C.

      Unchanged default password

    • D.

      Latest patches and updates not done

    Correct Answer
    A. Flood
    Explanation
    A flood is not a vulnerability to information security. A flood refers to a natural disaster where an area is submerged in water, causing damage to physical infrastructure. While a flood can potentially damage hardware and disrupt operations, it is not directly related to information security vulnerabilities such as data breaches, unauthorized access, or software vulnerabilities.

    Rate this question:

  • 12. 

    Which of the following information security technology is used for avoiding browser-based hacking?

    • A.

      Anti-malware in browsers

    • B.

      Remote browser access

    • C.

      Adware remover in browsers

    • D.

      Incognito mode in a browser

    Correct Answer
    B. Remote browser access
    Explanation
    Remote browser access is a technology used for avoiding browser-based hacking. It allows users to access a web browser on a remote server, which helps in keeping the user's local machine secure from any potential attacks. By using remote browser access, the user's browsing activities are performed on a remote server, and only the rendered display is transmitted to the user's device, thus minimizing the risk of browser-based hacking.

    Rate this question:

  • 13. 

    Compromising confidential information comes under

    • A.

      Bug

    • B.

       Threat

    • C.

      Vulnerability

    • D.

      Attack

    Correct Answer
    B.  Threat
    Explanation
    Compromising confidential information is considered a threat because it poses a risk to the confidentiality of sensitive data. A threat refers to any potential danger or harm that can exploit vulnerabilities and cause damage to an organization's assets or interests. In this case, the act of compromising confidential information can lead to unauthorized access, data breaches, or the misuse of sensitive data, making it a significant threat to the security and privacy of individuals or organizations.

    Rate this question:

  • 14. 

    Lack of access control policy is a

    • A.

      Bug

    • B.

      Threat

    • C.

      Vulnerability

    • D.

      Attack

    Correct Answer
    C. Vulnerability
    Explanation
    The correct answer is "Vulnerability" because a lack of access control policy refers to a weakness or flaw in a system's security measures that allows unauthorized individuals to gain access to sensitive information or resources. It is considered a vulnerability because it exposes the system to potential threats and attacks, making it easier for attackers to exploit the system's weaknesses and compromise its integrity.

    Rate this question:

  • 15. 

    All of the following are examples of real security and privacy threats except:

    • A.

      Hackers

    • B.

      Virus

    • C.

      Spam

    • D.

      Worm

    Correct Answer
    C. Spam
    Explanation
    Spam is not considered a security or privacy threat because it is mainly unsolicited and unwanted emails or messages. While spam can be annoying and time-consuming, it does not typically pose a direct risk to the security or privacy of an individual or organization. On the other hand, hackers, viruses, and worms are all examples of real security and privacy threats. Hackers can gain unauthorized access to systems, viruses can infect and damage files or software, and worms can spread rapidly through networks, causing disruptions and potential data breaches.

    Rate this question:

  • 16. 

    Trojan horses are very similar to virus in the matter that they are computer programs that replicate copies of themselves

    • A.

      True

    • B.

      False

    • C.

      Option 3

    • D.

      Option 4

    • E.

      Option 5

    Correct Answer
    B. False
    Explanation
    Trojan horses are not similar to viruses in the sense that they do not replicate copies of themselves. While viruses are self-replicating programs that can spread and infect other files, Trojan horses are deceptive programs that disguise themselves as legitimate software but carry out malicious activities once installed on a computer. Unlike viruses, Trojan horses do not have the ability to replicate and spread on their own.

    Rate this question:

  • 17. 

    Monitors user activity on internet and transmit that information in the background to someone else

    • A.

      Malware

    • B.

      Spyware

    • C.

      Adware

    • D.

      None of these

    Correct Answer
    B. Spyware
    Explanation
    Spyware is a type of malicious software that secretly monitors a user's activity on the internet and transmits that information to someone else without the user's knowledge or consent. It is designed to gather sensitive information such as passwords, credit card details, browsing habits, and personal data. Unlike adware, which displays unwanted advertisements, spyware operates covertly and focuses on gathering information. Therefore, the correct answer is Spyware.

    Rate this question:

  • 18. 

    Viruses are

    • A.

      Man made

    • B.

      Naturally occur

    • C.

      Machine made

    • D.

      Natural made

    Correct Answer
    A. Man made
    Explanation
    The answer "Man made" suggests that viruses are created or engineered by humans. This implies that viruses do not naturally occur in nature, nor are they created by machines. The term "man made" implies that viruses are a result of human intervention or manipulation, possibly for various purposes such as scientific research or biological warfare.

    Rate this question:

  • 19. 

    When the firm's purpose for their information infrastructure is to make its data and information available to those who are authorized to use it, the firm is seeking the objective of:

    • A.

      Confidentiality

    • B.

      Availability

    • C.

      Authorization

    • D.

      Integrity

    Correct Answer
    B. Availability
    Explanation
    The firm's purpose for their information infrastructure is to make its data and information available to those who are authorized to use it. This means that the firm wants to ensure that the data and information can be accessed and used by the authorized individuals whenever they need it. Therefore, the objective that the firm is seeking in this case is availability.

    Rate this question:

  • 20. 

    Which type of threat cannot replicate itself within a system, but can transmit its copies by means of e-mail?

    • A.

      Malware

    • B.

      Virus

    • C.

      Worm

    • D.

      Trojan horse

    • E.

      Option 5

    Correct Answer
    C. Worm
    Explanation
    A worm is a type of threat that cannot replicate itself within a system, but it can transmit its copies by means of e-mail. Unlike viruses, which need a host file to attach themselves to, worms are standalone programs that can spread independently through networks and email attachments. They can self-replicate and spread to other systems, causing damage and disruption. Therefore, a worm fits the description provided in the question.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 21, 2020
    Quiz Created by
    Officeuse Jtmk
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.