1.
In computer security, ……………………. means that computer system assets can be modified only by authorized parities.
Correct Answer
B. Integrity
Explanation
Integrity in computer security refers to the concept that computer system assets can be modified only by authorized parties. This means that the data and information within the system remain intact and accurate, and any changes made to them are done so by individuals who have the proper authorization. Ensuring integrity helps prevent unauthorized modifications, tampering, or corruption of data, ensuring the reliability and trustworthiness of the system.
2.
In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities.
Correct Answer
A. Confidentiality
Explanation
Confidentiality refers to the protection of information in a computer system, ensuring that it can only be accessed by authorized parties for reading purposes. This means that sensitive data remains private and secure, preventing unauthorized individuals from accessing or viewing it. Confidentiality is an essential aspect of computer security to maintain the privacy and integrity of information.
3.
State whether true of false.
i) A worm mails a copy of itself to other systems.
ii) A worm executes a copy of itself on another system
Correct Answer
C. True, True
Explanation
The given answer is True, True. A worm is a type of malicious software that is capable of self-replicating and spreading to other systems. It can do this by either mailing a copy of itself to other systems (as mentioned in statement i) or by executing a copy of itself on another system (as mentioned in statement ii). Therefore, both statements are true and the answer is True, True.
4.
A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs.
Correct Answer
B. Virus
Explanation
A virus is a program that can infect other programs by modifying them, including a copy of the virus program. This copy can then go on to infect other programs, creating a chain reaction of infection. Unlike worms, which are standalone programs that can replicate and spread independently, viruses require a host program to infect and spread. Zombies are computers that have been infected and controlled by a remote attacker, while trap doors are hidden vulnerabilities in a system that can be exploited for unauthorized access.
5.
Which of the following is independent malicious program that need not any host
program?
Correct Answer
D. Worm
Explanation
A worm is an independent malicious program that can spread itself across computer networks without the need for a host program. Unlike viruses, which require a host file to attach themselves to, worms are stand-alone programs that can replicate and spread on their own. They can exploit vulnerabilities in computer systems to gain unauthorized access and carry out malicious activities, such as stealing sensitive information or causing system damage. Therefore, the correct answer is Worm.
6.
The following security threats are very rare:
Correct Answer
B. Explosions.
Explanation
Explosions are considered rare security threats because they are not commonly encountered in most environments. While natural disasters, blackouts, and subversive employees are potential security risks that can occur more frequently, explosions are less likely to happen. They require specific circumstances such as the presence of explosive materials or intentional acts of sabotage. Therefore, explosions are not as commonly considered security threats compared to the other options listed.
7.
The following are the goals of network security, except;
Correct Answer
D. Confidentiality.
Explanation
The goals of network security include threat assessment, risk assessment, and asset identification. These goals aim to identify and assess potential threats and risks to the network, as well as identify and protect valuable assets. However, confidentiality is not listed as one of the goals. While confidentiality is an important aspect of network security, it is not specifically mentioned in the given options.
8.
The goal of ______________ is to reduce the exposure of the organization to malicious code.
Correct Answer
B. Anti-virus
Explanation
The goal of anti-virus is to reduce the exposure of the organization to malicious code. Anti-virus software is designed to detect, prevent, and remove computer viruses, malware, and other malicious software from infecting computer systems. By regularly scanning and monitoring the system, anti-virus software helps to identify and eliminate any potential threats, thereby reducing the organization's vulnerability to malicious code.
9.
Imagine the status/service of a bank if its customers are unable to make transactions using their accounts .This scenario refers to what goals of network security.
Correct Answer
B. Availability.
Explanation
The scenario described in the question refers to the goal of network security known as availability. Availability ensures that authorized users have access to the network and its resources when needed. In this case, if customers are unable to make transactions using their accounts, it means that the network or its services are not available to them. This could be due to various reasons such as network outages, system failures, or cyber attacks. Therefore, ensuring the availability of the network is crucial for maintaining the functionality and usability of the bank's services.
10.
Identify which of the following is not a potential risk to the network security.
Correct Answer
B. Anti-virus Protection.
Explanation
The correct answer is Anti-virus Protection. While email attachments, blended attacks, and renaming documents can all pose potential risks to network security, anti-virus protection is actually a measure taken to mitigate these risks. Anti-virus software is designed to detect, prevent, and remove malicious software, such as viruses, worms, and Trojans, which can compromise network security. Therefore, it is not considered a potential risk, but rather a protective measure.