Information Security and Access Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which university did Samer graduate from in 2003?

  • Aleppo University (correct)
  • No information provided
  • Unknown University
  • Toulouse University

What is Samer's preferred name?

  • Ronaldo
  • Wazan
  • Ahmad
  • Samer (correct)

During which years did Samer work with Ronaldo Mouchawar in Aleppo?

  • 2007-2011
  • 2003-2006 (correct)
  • No information provided
  • Unknown years

Which university awarded Samer his Master and PhD degrees?

<p>Toulouse University (C)</p> Signup and view all the answers

What is the main reference to check before asking any question in the course?

<p>Syllabus (C)</p> Signup and view all the answers

Which category of attackers focuses on gaining unauthorized access to computer systems?

<p>Hackers (D)</p> Signup and view all the answers

What is the term for unlawful use or duplication of software IP?

<p>Software piracy (C)</p> Signup and view all the answers

Which type of malware replicates itself on the same computer?

<p>Virus (D)</p> Signup and view all the answers

What is the term for a program that does something other than advertised and contains hidden code that launches an attack?

<p>Trojan (B)</p> Signup and view all the answers

How do worms spread to other network devices?

<p>By exploiting application or operating system vulnerabilities (D)</p> Signup and view all the answers

Which of the following is a critical characteristic of information?

<p>Availability (C)</p> Signup and view all the answers

What is the purpose of authentication in information security?

<p>To grant access to information (D)</p> Signup and view all the answers

What is the CIA triad in information security?

<p>Confidentiality, Integrity, Availability (B)</p> Signup and view all the answers

What is the McCumber cube used for in information security?

<p>To describe an architectural approach to secure information systems (A)</p> Signup and view all the answers

What is the purpose of encryption in information security?

<p>To protect data from unauthorized access (C)</p> Signup and view all the answers

Which of the following is a common method of social engineering attack?

<p>Phishing (B)</p> Signup and view all the answers

What is the main purpose of spam?

<p>To send unsolicited e-mails (A)</p> Signup and view all the answers

What is the term used for the act of digging through trash to find useful information?

<p>Dumpster diving (B)</p> Signup and view all the answers

What is a buffer overflow?

<p>An application error (A)</p> Signup and view all the answers

Which security model gives recommendations for information security management?

<p>ISO 27000 series (C)</p> Signup and view all the answers

Which type of malware is designed to hide actions or presence of other malicious software?

<p>Rootkit (D)</p> Signup and view all the answers

What is a logic bomb?

<p>Computer code that lies dormant (D)</p> Signup and view all the answers

Which type of malware allows an attacker to remotely control an infected computer?

<p>Botnet (A)</p> Signup and view all the answers

What is the main purpose of spyware?

<p>Collecting personal information (C)</p> Signup and view all the answers

What is password cracking?

<p>Trying every possible combination (A)</p> Signup and view all the answers

According to the text, what is the definition of security?

<p>The state of being free from danger or threat. (A)</p> Signup and view all the answers

According to the text, why do we need security in real life?

<p>To reduce the probability of dangers or threats. (B)</p> Signup and view all the answers

What is the relation between Computer Security, Network Security, OS Security, and Information Security?

<p>Computer Security, Network Security, and OS Security are all components of Information Security. (C)</p> Signup and view all the answers

According to the text, why are we sure that we will always have attacks in the future?

<p>All tools used to manage our information are vulnerable, including humans. (A)</p> Signup and view all the answers

According to the text, what are some examples of security attacks?

<p>Nigerian 419 advanced fee fraud, Malware, Identity theft using Firesheep, Phishing (A)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Related Documents

Week1-Week2 (6).pptx

More Like This

Information Security and Access Quiz
49 questions
Authorization and Access Control Quiz
5 questions
Access Control Management Quiz
45 questions

Access Control Management Quiz

InnovativeIndianapolis avatar
InnovativeIndianapolis
Use Quizgecko on...
Browser
Browser