Prelim Quiz 1
Question 1
Which of these are not part of the reason why we need to secure our network?
The correct answer is: To exploit vulnerabilities in the system
Question 2
Any form of security incident that is not properly handled can and eventually
wont turn into a bigger problem that will lead to a damaging data breach and
wont cause large amount of expense or it will collapse the whole system
The correct answer is 'False'.
Question 3
It will help the company to provide a better strategy in keeping a data secured
while avoiding intruders to alter or steal important and confidential
information.
The correct answer is: Security Trinity
Question 4
System that are intended to manage the computer itself such as the operating
system.
The correct answer is: System Software
Question 5
It ensures that the information in an information system is accurate.
The correct answer is: Integrity
An information that is only accessed by an authorized person.
The correct answer is: Confidential
Question 7
It is considered as a crucial part of information systems
The correct answer is: Security
Question 8
It is a model designed to guide policies for information security within an
organization.
The correct answer is: CIA Triad Information Security
Question 9
It is a structured procedure for taking care of any security incidents,
breaches, and network threats.
The correct answer is: Response
Question 10
Areas of Security Trinity where they need to have a good security measures to
avoid hackers from getting access to the network.
The correct answer is: Prevention
Question 11
Big corporations are not at risks to any form of security breach.
The correct answer is 'False'.
Question 12
Internet is an example of a network.
The correct answer is 'True'.
Question 13
How many key phases are there in an incident response plan ?
Answer:
6
Feedback
The correct answer is: 6
Question 14
It is the tangible parts of a computer system.
The correct answer is: Hardware
Question 15
It has a vital role in an information system because it is the one that allows a
company to link their computers and its users
The correct answer is: Network
Question 16
It is the process of taking preventative measures to keep the network
infrastructure from any unauthorized access, misuse of important information
The correct answer is: Network security
Question 17
Availability refers to the ability of a network to protect its information from
any unauthorized access.
The correct answer is 'False'.
Question 18
It is the network security solution by an institute to Answer
prevent
any malicious activity in a network.
The correct answer is: Detect
Question 19
It determines whether you are allowed to access a specific information or file.
The correct answer is: Authorization
Question 20
System that plays a vital part in Network security since it is the information
that an organization is trying to protect and avoid from any unauthorized access
The correct answer is: Information
PRELIM QUIZ 2
Question 1
It is an act that exploits a vulnerability.
The correct answer is: Attack
Question 2
These are what make networks prone to information loss and downtime
The correct answer is: Vulnerabilities
Question 3
These layers work together to transmit the data from one person to another world
wide.
The correct answer is: OSI Layer
Question 4
It is a set of standards that are widely used as a basis for communication.
The correct answer is: Protocol
Question 5
It has been developed by ISO in the year 1984.
The correct answer is: OSI Reference Model
Question 6
SQL stands for?
The correct answer is: Structured Query Language
Question 7
Two different devices can communicate with each other regardless of the
manufacturer as long as they have the same protocol.
The correct answer is 'True'.
Question 8
Worms can be classified as a type of computer virus that needs a third party or
a user to replicate and spread through the system.
The correct answer is 'False'.
Question 9
A type of malware that automatically sends advertisements to the users.
The correct answers are: Adware, Advertising-supported software
Question 10
What are the signs and symptoms that your device/s are getting infected by any
malware. (Choose all that applies)
The correct answers are: Increased CPU usage, Software freezes or crashes,
Slower computer performance, Appearance of strange desktop icons
Question 11
any program design to damage specific file or computer system.
The correct answer is: Malware
Question 12
This layer is also called human-computer interaction layer.
The correct answer is: Application Layer
Question 13
It pretends to be a legitimate programs in order to gain access to a system.
The correct answer is: Trojan Horse
Question 14
This layer involves devices such as router, UTP Cables and other networking
devices to transfer data.
The correct answer is: Physical Layer
Question 15
It may contain phishing scams and malware.
The correct answer is: Spam
Question 16
Type of malware that may contain an attachment to an email that loads malware
onto your computer system.
The correct answer is: Phishing
Question 17
Which of the following are not part of OSI Layer?
The correct answer is: Transfer Layer
Question 18
Brute force attack are often successful because most of the users uses different
ordinary words as their passwords.
The correct answer is 'False'.
Question 19
It provides data routing paths where data will take for network communication.
The correct answer is: Network Layer
Question 20
It is anything that can disrupt the operation, functioning, integrity, or
availability of a network or system
The correct answer is: Threat
PRELIM EXAM
Question 1
Layer that is responsible for establishing and maintaining connections.
The correct answer is: Session Layer
Question 2
It is an end-to-end layer used to deliver messages to a host
The correct answer is: Transport Layer
Question 3
Type of software that is often called as end-user programs.
The correct answer is: Application Software
Question 4
It is designed to appear as a legit program to gain access to a network.
The correct answer is: Trojan horse
Question 5
Any form of security incident that is properly handled can and eventually will
turn into a bigger problem.
The correct answer is 'False'.
Question 6
Question text
An abbreviation that is consider as the brains of the computer.
The correct answer is: CPU
Question 7
Is the process of using social skills to encourage people to disclose their
credentials
The correct answer is: Social Engineering
Question 8
It's anything that can interrupt the operation, functioning, integrity, or
availability of a network or system.
The correct answer is: Threat
Question 9
Refers to the information system which ensures that the information remains
accurate.
The correct answer is: Integrity
Question 10
Data Link Layer enables data transfer between two devices on the same network.
The correct answer is 'True'.
Question 11
Attack that send an email that contains attachment that loads malware onto your
computer
The correct answer is: Phishing
Question 12
Which of these are not part of the reason why network security is important
(Choose all that applies)
The correct answers are: To expose company assets, To take advantage of
competitors confidential information
Question 13
It is sometimes called TCP hijacking attack.
The correct answer is: Man-in-the-middle attack
Question 14
In implementing network security, company should invest more in preventing or
avoiding any security breach over detecting and responding to any form of attack
The correct answer is 'True'.
Question 15
Is any program that is harmful to a computer user.
The correct answer is: Malware
Question 16
A software that can detect malware.
The correct answer is: Antivirus Software
Question 17
This attack tries to defeat an authentication mechanism by systematically
entering each word in a dictionary as a password.
The correct answer is: Dictionary Attack
Question 18
OSI Layer that is sometimes called HCI layer.
The correct answer is: Application
Question 19
This is a way of adding secondary layer of security to your account password.
The correct answer is: Two-factor authentication
Question 20
It is the foundation for all security policies.
The correct answer is: Security Trinity
Question 21
It is a security solution by organization to notice any malicious activity in a
network.
The correct answer is: Network Detection
Question 22
Information policy where the data should be access by an authorized person/s
only.
The correct answer is: Confidentiality
Question 23
Based with SANS Technology Institute, it is the process of making preventative
measures to keep the underlying networking infrastructure from any unauthorized
access.
The correct answer is: Network Security
Question 24
it is the one managing the computer hardware resources in addition to
applications and data.
The correct answer is: Operating System
Question 25
Combination of brute force and dictionary attack.
The correct answer is: Hybrid
Question 26
Which of these are not part of security model that is very popular to
information security.
The correct answer is: Assurance
Question 27
An attack that allows any unauthorized users a way or passage to get inside a
restricted area.
The correct answer is: Tailgating attack
Question 28
It is a combined set of components for collecting, storing and processing data
and for providing information, facts and knowledge.
The correct answer is: Information System
Question 29
Which of the following is not a way on improving basic security. (Choose all
that applies)
The correct answers are: Ignore Updates, Download software to any website
available, Use easy to remember password, Reuse password
Question 30
It is the connection of two or more computer that share its resources
The correct answer is: Network
Question 31
This attack uses any password-cracking software to mathematically calculate
every possible password.
The correct answer is: Brute-Force Attack
Question 32
It is a type of an injection attack that makes it possible to insert and execute
malicious SQL statements
The correct answer is: SQL Injection
Question 33
It serves as a proof and verifies that you are the person you say you are or
what you claim to be.
The correct answer is: Authentication
Question 34
A set of instructions and execute a specific task/s
The correct answer is: Software
Question 35
Worm has the ability to replicate itself without a host program and spread
independently while viruses rely on human activity to spread and damage a system
or file.
The correct answer is 'True'.
Question 36
An attack where the hacker mimics another employee in the company.
The correct answer is: Impersonation
Question 37
This attack happens when the attacker or hacker sends too much information to
the application causing it to overflow
The correct answer is: Buffer Overflow
Question 38
It has an additional ability where they can modify security settings of a
software.
The correct answer is: Spyware
Question 39
Question text
An act that exploits a weakness in a system.
The correct answer is: Attack
Question 40
Question text
Adware is a type of malware that restricts user access to the computer either by
encrypting files on the hard drive or locking down the system
The correct answer is 'False'.