AIU Informatics and Communications CS Chapter 11 Security 2022-2023 Quiz

DesirousMagnolia avatar
DesirousMagnolia
·
·
Download

Start Quiz

Study Flashcards

15 Questions

Computer risk is any threat, action, or event that will negatively impact assets through exploiting a vulnerability; resulting in: damaging or loosing computer hardware, data and information, reducing or stopping the processing capabilities, or breaching security that would harm an organization or an individual.

False

Cybercrime is any illegal act via the internet, people who commit or prepare to such crimes are called cyber criminals and are categorized to: hackers, crackers, script kiddies, cyber extortionists, cyber terrorists, unethical employees and corporate espionage.

False

A hacker is a professional with malicious intentions to destroy, steal, or spy on data by gaining access to computers or networks illegally.

False

Nowadays computers play a critical role in all our life aspects. Operations such as storage and management of information, communications, and selling, purchasing, and banking operations all rely on computers.

False

Cyber criminals are categorized into various types including: hackers, crackers, script kiddies, cyber extortionists, cyber terrorists, unethical employees and corporate espionage.

False

Measures were crucial to protect computers and its information whether stored or transmitted from being lost, damaged, or stolen.

False

Script kiddies refers to unskilled users who depend on premade scripts or programs to gain illegal access to a computer, network, or application, with no knowledge of how to hack or how the script works and just to impress friends and appear as technology expert.

True

A cracker is a professional with malicious intentions to gain illegal access to a computer, network, or application to destroy, steal data, or breaking a proprietary software protection violating the license agreement and allowing users to use it for free (piracy), or cracking a password.

True

Cyber extortionists (blackmailers via internet) threaten to disclose private or confidential information of an individual or an organization if not paid an amount of money.

True

An organized highly skilled team uses the internet or networks to destroy or damage computers for political reasons; targeting the infrastructure electronically to hinder or completely stop computers at ministries, governmental organizations, air traffic control system, stock market system, energy generating systems, etc., which could lead to crippling a whole country or a government. This describes cyber terrorists.

True

Unethical employees might exploit vulnerabilities in the computer system of the company they work for, or break into other staff computers to steal confidential information and sell it to a rival company either for financial gains or for revenge after being fired.

True

Some corporates specialize in providing espionage services, with a highly skilled team in computers and communications. An unethical corporate could hire espionage corporate to spy on and steal other rival corporates' ideas and gain a competitive advantage unethically. This is known as corporate espionage.

True

Computers that are connected to the internet are at a higher risk than computers within a house or an organization’s premises.

True

A virus is a malicious program that negatively affects the computer by changing the way it normally works, without the user's permission and knowledge.

True

Virus have many types: boot-sector virus that infects the boot sector on the hard disks and prevent.

False

Test your knowledge of computer security measures and protection of information with this quiz based on Chapter 11 of AIU's Faculty of Informatics and Communications CS course. Explore topics such as data encryption, network security, and risk management.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser