1.
In computer security, ……………………. means that computer system assets can be modified only by authorized parities.
Correct Answer
B. Integrity
Explanation
Integrity means that computer system assets can be modified only by authorized parties. This refers to the concept of maintaining the accuracy, consistency, and trustworthiness of data and information. It ensures that unauthorized modifications or alterations to the system or its data are prevented, and only authorized changes are allowed.
2.
In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities.
Correct Answer
A. Confidentiality
Explanation
Confidentiality in computer security refers to the protection of information in a computer system, ensuring that it can only be accessed by authorized parties for reading. This means that sensitive data is kept private and secure, preventing unauthorized individuals from gaining access to it.
3.
State whether true of false.
i) A worm mails a copy of itself to other systems.
ii) A worm executes a copy of itself on another system.
Correct Answer
C. True, True
Explanation
A worm is a type of malicious software that can replicate itself and spread to other systems. It can do this by either mailing a copy of itself to other systems (as stated in option i) or by executing a copy of itself on another system (as stated in option ii). Therefore, both statements are true and the correct answer is "True, True".
4.
A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs.
Correct Answer
B. Virus
Explanation
A virus is a program that can infect other programs by modifying them, including a copy of the virus program. This copy can then go on to infect other programs, spreading the virus further.
5.
Which of the following is independent malicious program that need not any host
program?
Correct Answer
D. Worm
Explanation
A worm is an independent malicious program that does not require a host program to spread and replicate itself. Unlike viruses, which need a host file or program to attach to, worms can self-replicate and spread across computer networks without any assistance. They often exploit vulnerabilities in operating systems or network protocols to propagate and can cause significant damage by consuming network bandwidth, overloading servers, and stealing sensitive information. Therefore, a worm is the correct answer as it is a standalone malicious program that can operate independently.
6.
____________ is used to describe those hackers who use their computer skills with malicious intent for illegal purposes or nefarious activities;
Correct Answer
A. Black Hats
Explanation
Black Hats are used to describe hackers who use their computer skills with malicious intent for illegal purposes or nefarious activities. They engage in activities such as hacking into computer systems, stealing sensitive information, spreading malware, and causing damage to networks or websites. These individuals operate outside the boundaries of the law and often seek personal gain or to cause harm to others.
7.
The following are the goals of network security, EXCEPT;
Correct Answer
B. Asset Assessment
Explanation
The goals of network security include threat assessment, risk assessment, and asset identification. Asset assessment, however, is not a goal of network security. Asset assessment typically refers to the process of evaluating the value and importance of an organization's assets, which may be part of overall risk management but is not specifically related to network security.
8.
The goal of ______________ is to reduce the exposure of the organization to malicious code.
Correct Answer
B. Anti-virus
Explanation
The goal of using anti-virus software is to reduce the exposure of the organization to malicious code. Anti-virus software helps to detect, prevent, and remove malware such as viruses, worms, and Trojan horses from infecting computer systems. By regularly scanning and monitoring the organization's systems, anti-virus software can identify and eliminate any malicious code that may pose a threat to the organization's security. This helps to protect sensitive data, prevent system crashes, and minimize the potential damage caused by malicious attacks.
9.
“Imagine the status/service of a bank if its customers are unable to make transactions using their accounts." This scenario refers to what goals of network security ……..
Correct Answer
C. Availability.
Explanation
This scenario refers to the goal of network security called availability. The ability of customers to make transactions using their accounts is a key aspect of the bank's service and status. If customers are unable to access their accounts and make transactions, it can severely impact the availability of the bank's services. Therefore, ensuring the availability of the network and systems is crucial for maintaining the bank's reputation and customer satisfaction.
10.
Identify which of the following is NOT a potential risk to the network security.
Correct Answer
B. Anti-virus Protection.
Explanation
Anti-virus protection is not a potential risk to network security because it is a security measure implemented to detect and remove viruses, malware, and other malicious software that can compromise the network. It helps to prevent unauthorized access, data breaches, and system damage. Therefore, it is not considered a risk, but rather a protective measure.