Information Security and Access Quiz
23 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which university did Samer graduate from?

  • Unknown University
  • No information provided
  • Aleppo University (correct)
  • Toulouse University

During exams, what materials are students allowed to use?

  • Only the textbook
  • Personal notes and slides
  • No materials allowed
  • Internet resources (correct)

What is the main reference to check before asking any question?

  • Personal notes
  • Slides
  • The textbook
  • The syllabus (correct)

According to the text, what is the definition of vulnerability?

<p>A weakness or fault in a system (A)</p> Signup and view all the answers

According to the text, what is the definition of authenticity?

<p>The quality or state of being genuine (C)</p> Signup and view all the answers

According to the text, what is the definition of exploit?

<p>A technique used to compromise a system (B)</p> Signup and view all the answers

According to the text, what is the definition of confidentiality?

<p>The protection from disclosure to unauthorized individuals or systems (D)</p> Signup and view all the answers

Which type of malware hides or removes traces of log-in records and log entries?

<p>Rootkit (A)</p> Signup and view all the answers

What is a logic bomb?

<p>Computer code that lies dormant (A)</p> Signup and view all the answers

What is the advantage of a botnet for attackers?

<p>Operate in the background with no visible evidence (A)</p> Signup and view all the answers

What is the purpose of a keylogger?

<p>To capture user's keystrokes (D)</p> Signup and view all the answers

Which of the following is a social engineering attack that involves sending an email claiming to be from a legitimate source and tries to trick the user into giving private information?

<p>Phishing (D)</p> Signup and view all the answers

What is the term used for a social engineering attack that targets specific users with email messages?

<p>Spear phishing (D)</p> Signup and view all the answers

What technique is used by spammers to circumvent text-based filters by using graphical images of text in spam emails?

<p>GIF layering (D)</p> Signup and view all the answers

What is the term used for a physical procedure in social engineering where an attacker follows behind an authorized individual through an access door?

<p>Tailgating (B)</p> Signup and view all the answers

According to the text, what is the definition of security?

<p>The state of being free from danger or threat. (D)</p> Signup and view all the answers

What is the relation between Computer Security, Network Security, OS Security, and Information Security?

<p>Computer Security, Network Security, and OS Security are all subsets of Information Security. (C)</p> Signup and view all the answers

Why are we sure that we will always have attacks in the future, according to the text?

<p>All tools used to manage our information are vulnerable, including humans. (B)</p> Signup and view all the answers

Which type of attack was Stuxnet involved in, according to the text?

<p>Sabotaging centrifuges used to enrich uranium gas. (A)</p> Signup and view all the answers

Which type of attacker is motivated by political or social causes?

<p>Hacktivist or cyberactivist (C)</p> Signup and view all the answers

Which method of virus infection involves the virus appending itself to the end of a file and replacing the first three bytes with a jump instruction?

<p>Appender infection (B)</p> Signup and view all the answers

What is the main difference between a virus and a worm?

<p>Viruses require user action to spread, while worms can spread automatically. (A)</p> Signup and view all the answers

What is a Trojan?

<p>A program that does something other than advertised (D)</p> Signup and view all the answers

More Like This

Information Security and Access Quiz
30 questions
Information Security and Access Quiz
49 questions
Authorization and Access Control Quiz
5 questions
Access Control Management Quiz
45 questions

Access Control Management Quiz

InnovativeIndianapolis avatar
InnovativeIndianapolis
Use Quizgecko on...
Browser
Browser