30 Questions
Which university did Samer graduate from in 2003?
Aleppo University
What is Samer's preferred name?
Samer
During which years did Samer work with Ronaldo Mouchawar in Aleppo?
2003-2006
Which university awarded Samer his Master and PhD degrees?
Toulouse University
What is the main reference to check before asking any question in the course?
Syllabus
Which category of attackers focuses on gaining unauthorized access to computer systems?
Hackers
What is the term for unlawful use or duplication of software IP?
Software piracy
Which type of malware replicates itself on the same computer?
Virus
What is the term for a program that does something other than advertised and contains hidden code that launches an attack?
Trojan
How do worms spread to other network devices?
By exploiting application or operating system vulnerabilities
Which of the following is a critical characteristic of information?
Availability
What is the purpose of authentication in information security?
To grant access to information
What is the CIA triad in information security?
Confidentiality, Integrity, Availability
What is the McCumber cube used for in information security?
To describe an architectural approach to secure information systems
What is the purpose of encryption in information security?
To protect data from unauthorized access
Which of the following is a common method of social engineering attack?
Phishing
What is the main purpose of spam?
To send unsolicited e-mails
What is the term used for the act of digging through trash to find useful information?
Dumpster diving
What is a buffer overflow?
An application error
Which security model gives recommendations for information security management?
ISO 27000 series
Which type of malware is designed to hide actions or presence of other malicious software?
Rootkit
What is a logic bomb?
Computer code that lies dormant
Which type of malware allows an attacker to remotely control an infected computer?
Botnet
What is the main purpose of spyware?
Collecting personal information
What is password cracking?
Trying every possible combination
According to the text, what is the definition of security?
The state of being free from danger or threat.
According to the text, why do we need security in real life?
To reduce the probability of dangers or threats.
What is the relation between Computer Security, Network Security, OS Security, and Information Security?
Computer Security, Network Security, and OS Security are all components of Information Security.
According to the text, why are we sure that we will always have attacks in the future?
All tools used to manage our information are vulnerable, including humans.
According to the text, what are some examples of security attacks?
Nigerian 419 advanced fee fraud, Malware, Identity theft using Firesheep, Phishing
Test your knowledge on information security and access with this quiz. Learn about the different categories of attackers and understand the importance of balancing protection and availability.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free