Information Security and Access Quiz

GracefulMossAgate avatar
GracefulMossAgate
·
·
Download

Start Quiz

Study Flashcards

49 Questions

What is the main reference to check before asking any question in the course?

Syllabus

Which of the following is a common method used in social engineering attacks?

Pharming

What is the primary purpose of spam?

To send unsolicited e-mails

What is the main goal of phishing?

To trick users into giving private information

What is the consequence of a buffer overflow?

Application error

Which security model gives recommendations for information security management?

ISO 27000 series

Which of the following is NOT a critical characteristic of information?

Accuracy

What is the definition of a vulnerability?

A weakness or fault in a system

What is the purpose of authentication in information security?

To secure information from unauthorized access

What is the CIA triad in information security?

Confidentiality, Integrity, Availability

What is the McCumber cube used for in information security?

To map security goals to concrete ideas

According to the text, what is the definition of security?

The state of being free from danger or threat.

According to the text, what is the relation between computer security, network security, OS security, and information security?

Computer security, network security, and OS security are all subcategories of information security.

Why are we sure that we will always have attacks in the future, according to the text?

Because all tools used to manage our information are vulnerable, including humans.

What are some examples of security attacks mentioned in the text?

Nigerian 419 advanced fee fraud, malware, identity theft, phishing

What did Stuxnet do, according to the text?

Sabotaged centrifuges used to enrich uranium gas

Which category of attackers is motivated by political or social causes?

Hacktivist or cyberactivist

What is the main difference between viruses and worms?

Viruses can automatically spread to other computers, while worms rely on user action to spread.

What is the purpose of a Trojan?

To do something other than advertised

How does a virus spread through a computer system?

By infecting files opened by the user or operating system

What is the purpose of malware classification?

To predict the future behavior of malware

Which type of malware is designed to hide or remove traces of log-in records and log entries?

Rootkits

Which type of malware lies dormant until triggered by a specific logical event?

Logic bombs

What is the purpose of a backdoor in software code?

To circumvent normal security

What is the main function of spyware?

To gather personal information

What is the purpose of IP spoofing in a man-in-the-middle attack?

To reroute and forge data

According to the text, what is the main requirement for exams in the course?

Exams are open book

According to the text, how are grades determined in the course?

Grades are based on knowledge

According to the text, what is the main motivation for building knowledge in the course?

Intrinsic motivation

Which of the following is NOT a critical characteristic of information?

Availability

What is the purpose of authentication in information security?

To grant access to information

What is the main purpose of IP spoofing in a man-in-the-middle attack?

To hide the attacker's identity

Which type of malware is designed to hide or remove traces of log-in records and log entries?

Rootkit

Which of the following is a social engineering attack that involves sending an email claiming to be from a legitimate source and tries to trick the user into giving private information?

Spear phishing

What is the primary purpose of spam?

To distribute malware

What is a buffer overflow?

An application error that occurs when more data is sent to a buffer than it can handle

Which security model gives recommendations for information security management?

ISO 27000 series

Which type of malware is designed to hide or remove traces of log-in records and log entries?

Rootkit

What is the main function of a keylogger?

To capture user's keystrokes

What is the purpose of IP spoofing in a man-in-the-middle attack?

To modify packets using fake IP addresses

What is the main goal of a denial-of-service (DoS) attack?

To overwhelm a target system with requests

According to the text, what is the main difference between viruses and worms?

Viruses replicate themselves on the same computer, while worms spread to other network devices.

What is the purpose of a Trojan, according to the text?

To do something other than advertised and contain hidden code that launches an attack.

Which category of attackers is motivated by political or social causes?

Hacktivist or cyberactivist

What is the purpose of authentication in information security?

To verify the identity of a user and ensure authorized access to information.

According to the text, what is the main difference between security and trust?

Security is always needed, while trust can be used whenever possible.

According to the text, what is the definition of information security?

The absence of threats or dangers to the information.

According to the text, why are we sure that we will always have attacks in the future?

All tools used to manage our information are vulnerable, including humans.

According to the text, what is the main goal of a man-in-the-middle attack?

To modify or manipulate data in transit.

Test your knowledge on information security and access with this quiz. Learn about the different categories of attackers and understand the importance of balancing protection and availability.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser