Information Security and Access Quiz

GracefulMossAgate avatar
GracefulMossAgate
·
·
Download

Start Quiz

Study Flashcards

30 Questions

Which university did Samer graduate from in 2003?

Aleppo University

What is Samer's preferred name?

Samer

During which years did Samer work with Ronaldo Mouchawar in Aleppo?

2003-2006

Which university awarded Samer his Master and PhD degrees?

Toulouse University

What is the main reference to check before asking any question in the course?

Syllabus

Which category of attackers focuses on gaining unauthorized access to computer systems?

Hackers

What is the term for unlawful use or duplication of software IP?

Software piracy

Which type of malware replicates itself on the same computer?

Virus

What is the term for a program that does something other than advertised and contains hidden code that launches an attack?

Trojan

How do worms spread to other network devices?

By exploiting application or operating system vulnerabilities

Which of the following is a critical characteristic of information?

Availability

What is the purpose of authentication in information security?

To grant access to information

What is the CIA triad in information security?

Confidentiality, Integrity, Availability

What is the McCumber cube used for in information security?

To describe an architectural approach to secure information systems

What is the purpose of encryption in information security?

To protect data from unauthorized access

Which of the following is a common method of social engineering attack?

Phishing

What is the main purpose of spam?

To send unsolicited e-mails

What is the term used for the act of digging through trash to find useful information?

Dumpster diving

What is a buffer overflow?

An application error

Which security model gives recommendations for information security management?

ISO 27000 series

Which type of malware is designed to hide actions or presence of other malicious software?

Rootkit

What is a logic bomb?

Computer code that lies dormant

Which type of malware allows an attacker to remotely control an infected computer?

Botnet

What is the main purpose of spyware?

Collecting personal information

What is password cracking?

Trying every possible combination

According to the text, what is the definition of security?

The state of being free from danger or threat.

According to the text, why do we need security in real life?

To reduce the probability of dangers or threats.

What is the relation between Computer Security, Network Security, OS Security, and Information Security?

Computer Security, Network Security, and OS Security are all components of Information Security.

According to the text, why are we sure that we will always have attacks in the future?

All tools used to manage our information are vulnerable, including humans.

According to the text, what are some examples of security attacks?

Nigerian 419 advanced fee fraud, Malware, Identity theft using Firesheep, Phishing

Test your knowledge on information security and access with this quiz. Learn about the different categories of attackers and understand the importance of balancing protection and availability.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser