49 Questions
What is the main reference to check before asking any question in the course?
Syllabus
Which of the following is a common method used in social engineering attacks?
Pharming
What is the primary purpose of spam?
To send unsolicited e-mails
What is the main goal of phishing?
To trick users into giving private information
What is the consequence of a buffer overflow?
Application error
Which security model gives recommendations for information security management?
ISO 27000 series
Which of the following is NOT a critical characteristic of information?
Accuracy
What is the definition of a vulnerability?
A weakness or fault in a system
What is the purpose of authentication in information security?
To secure information from unauthorized access
What is the CIA triad in information security?
Confidentiality, Integrity, Availability
What is the McCumber cube used for in information security?
To map security goals to concrete ideas
According to the text, what is the definition of security?
The state of being free from danger or threat.
According to the text, what is the relation between computer security, network security, OS security, and information security?
Computer security, network security, and OS security are all subcategories of information security.
Why are we sure that we will always have attacks in the future, according to the text?
Because all tools used to manage our information are vulnerable, including humans.
What are some examples of security attacks mentioned in the text?
Nigerian 419 advanced fee fraud, malware, identity theft, phishing
What did Stuxnet do, according to the text?
Sabotaged centrifuges used to enrich uranium gas
Which category of attackers is motivated by political or social causes?
Hacktivist or cyberactivist
What is the main difference between viruses and worms?
Viruses can automatically spread to other computers, while worms rely on user action to spread.
What is the purpose of a Trojan?
To do something other than advertised
How does a virus spread through a computer system?
By infecting files opened by the user or operating system
What is the purpose of malware classification?
To predict the future behavior of malware
Which type of malware is designed to hide or remove traces of log-in records and log entries?
Rootkits
Which type of malware lies dormant until triggered by a specific logical event?
Logic bombs
What is the purpose of a backdoor in software code?
To circumvent normal security
What is the main function of spyware?
To gather personal information
What is the purpose of IP spoofing in a man-in-the-middle attack?
To reroute and forge data
According to the text, what is the main requirement for exams in the course?
Exams are open book
According to the text, how are grades determined in the course?
Grades are based on knowledge
According to the text, what is the main motivation for building knowledge in the course?
Intrinsic motivation
Which of the following is NOT a critical characteristic of information?
Availability
What is the purpose of authentication in information security?
To grant access to information
What is the main purpose of IP spoofing in a man-in-the-middle attack?
To hide the attacker's identity
Which type of malware is designed to hide or remove traces of log-in records and log entries?
Rootkit
Which of the following is a social engineering attack that involves sending an email claiming to be from a legitimate source and tries to trick the user into giving private information?
Spear phishing
What is the primary purpose of spam?
To distribute malware
What is a buffer overflow?
An application error that occurs when more data is sent to a buffer than it can handle
Which security model gives recommendations for information security management?
ISO 27000 series
Which type of malware is designed to hide or remove traces of log-in records and log entries?
Rootkit
What is the main function of a keylogger?
To capture user's keystrokes
What is the purpose of IP spoofing in a man-in-the-middle attack?
To modify packets using fake IP addresses
What is the main goal of a denial-of-service (DoS) attack?
To overwhelm a target system with requests
According to the text, what is the main difference between viruses and worms?
Viruses replicate themselves on the same computer, while worms spread to other network devices.
What is the purpose of a Trojan, according to the text?
To do something other than advertised and contain hidden code that launches an attack.
Which category of attackers is motivated by political or social causes?
Hacktivist or cyberactivist
What is the purpose of authentication in information security?
To verify the identity of a user and ensure authorized access to information.
According to the text, what is the main difference between security and trust?
Security is always needed, while trust can be used whenever possible.
According to the text, what is the definition of information security?
The absence of threats or dangers to the information.
According to the text, why are we sure that we will always have attacks in the future?
All tools used to manage our information are vulnerable, including humans.
According to the text, what is the main goal of a man-in-the-middle attack?
To modify or manipulate data in transit.
Test your knowledge on information security and access with this quiz. Learn about the different categories of attackers and understand the importance of balancing protection and availability.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free