Computer Security Techniques Quiz
15 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a Vulnerability in the context of computer security?

  • A form of attack on a network
  • Securing remote access to a computer
  • A method of bypassing normal authentication
  • A weakness that allows an attacker to compromise a system's security (correct)
  • What does Vulnerability management involve?

  • Creating backdoors in computer systems
  • Installing programs to secure remote access
  • Identifying, classifying, remediating, and mitigating vulnerabilities (correct)
  • Modifying existing hardware devices
  • What is a Backdoor in the context of computer security?

  • A method of bypassing normal authentication and obtaining access while remaining undetected (correct)
  • A method of securing remote access to a computer
  • An installed program used for data encryption
  • A way to fake information about disk and memory usage
  • What is the primary purpose of Data Encryption in information security?

    <p>To secure data by converting it into a code</p> Signup and view all the answers

    What is Direct-access attack also known as?

    <p>Unauthorized physical access</p> Signup and view all the answers

    What is the main goal of an employee engaging in extortion within a company?

    <p>To obtain money or other goods by threatening to take actions against the victim's interest</p> Signup and view all the answers

    What action did Washington Leung take against his ex-firm after leaving it?

    <p>He deleted over 900 files related to employee compensation</p> Signup and view all the answers

    How can an employee use intellectual property theft for extortion purposes?

    <p>By demanding money in exchange for not passing on the stolen information</p> Signup and view all the answers

    In the context of employee threats, what does 'harassment of other employees' involve?

    <p>Displaying inappropriate material and sending harassing emails</p> Signup and view all the answers

    Which of the following is an example of internet abuse within a company?

    <p>Accessing unauthorized websites for personal use during work hours</p> Signup and view all the answers

    What did Washington Leung do to frame a female co-worker after leaving his firm?

    <p>He gave her a substantial raise and bonus without authorization</p> Signup and view all the answers

    Which action demonstrates employee extortion according to the text?

    <p>Stealing intellectual property and demanding money not to disclose it</p> Signup and view all the answers

    How can an employee harass other employees via email as described in the text?

    <p>By sending inappropriate or threatening emails</p> Signup and view all the answers

    'Displaying inappropriate material' as a form of harassment of other employees refers to what kind of content?

    <p>'Displaying confidential business plans'</p> Signup and view all the answers

    'Employee and Ex-Employee Threats' include which of the following according to the provided text?

    <p>'Harassment of other employees via email'</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser