Activity 4: answer keys
1 In system hacking, which of the following is the most crucial activity?. Single
choice.
Ans: cracking passwords
2 Hackers usually used the computer virus for ______ purpose
Ans: to corrupt users data
3 Which is the legal form of hacking based on which jobs are provided in IT
industries and firms?
Ans: ethical hacking
4.Which of the following refers to the violation of the principle if a computer is no
more accessible?
Ans: availability
5 Why are the factors like Confidentiality, Integrity, Availability, and Authenticity
considered as the fundamentals?. Single choice.
Ans: they help understand security and …..
6 Why are the factors like Confidentiality, Integrity, Availability, and Authenticity
considered as the fundamentals?. Single choice.
Ans: true
7. In order to ensure the security of the data/ information, we need to __________
the data
Ans: encrypt
8 _________ is a type of software designed to help the user's computer detect
viruses and avoid them..
Ans: antivirus
9 It can be a software program or a hardware device that filters all data packets
coming through the internet or a network and it is known as the __________.
Ans: firewall
10 Information security threats can be internal as well as external, and they can
be accidental as well as intentional
Ans: true
11 Compromising confidential information comes under _________.. Single choice.
Ans: threat
12 An information security risk is a potential undesirable outcome of a breach of
information security by an information security threat.. Single choice.
Ans: true
13. __________ are those individuals who maintain and handles IT security in any
firm or organization.
Ans: cyber auditor
14 Lack of access control policy is a __
Ans: vulnerability
15. When the database and software library are made available to persons not
entitled to have access it is referred to as unauthorized use.. Single choice.
Ans: true
16. Hackers who help in finding bugs and vulnerabilities in a system & don’t
intend to crack a system are termed as ________.. Single choice.
Ans: gray hat hackers
17. _____ is the practice and precautions taken to protect valuable information
from unauthorized access, recording, disclosure or destruction.. Single choice.
Ans: information security
18. Which type of threat cannot replicate itself within a system, but can transmit
its copies by means of e-mail?. Single choice.
Ans: malware
19. When the firm's purpose for their information infrastructure is to make its
data and information available to those who are authorized to use it, the firm is
seeking the objective of:
Ans: confidenciality
20 Possible threat to any information cannot be _______
Ans: ignored
21. User authorization makes use of access control files that specify the levels of
access available to each user
Ans: true
22. When changes are made to the firm's data, information, and software, the
type of information security risk is:. Single choice.
Ans: unauthorized modification
23 The information security objective of confidentiality is to make its data and
information available to those who are authorized to use it.
Ans: true
24. In the computer networks, the encryption techniques are primarily used for
improving the __________..
Ans: security
25 Which of the following refers to stealing one's idea or invention of others and
use it for their own benefits?. Single choice.
Ans: plagiarism