0% found this document useful (0 votes)
30 views5 pages

Cybersecurity Fundamentals Quiz

The document contains a series of answer keys related to system hacking and information security concepts. Key topics include password cracking, ethical hacking, data encryption, and the roles of cyber auditors. It also addresses various types of threats, vulnerabilities, and the importance of confidentiality, integrity, and availability in information security.

Uploaded by

Gabriel Patalod
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views5 pages

Cybersecurity Fundamentals Quiz

The document contains a series of answer keys related to system hacking and information security concepts. Key topics include password cracking, ethical hacking, data encryption, and the roles of cyber auditors. It also addresses various types of threats, vulnerabilities, and the importance of confidentiality, integrity, and availability in information security.

Uploaded by

Gabriel Patalod
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Activity 4: answer keys

1 In system hacking, which of the following is the most crucial activity?. Single
choice.
Ans: cracking passwords

2 Hackers usually used the computer virus for ______ purpose


Ans: to corrupt users data

3 Which is the legal form of hacking based on which jobs are provided in IT
industries and firms?
Ans: ethical hacking

4.Which of the following refers to the violation of the principle if a computer is no


more accessible?
Ans: availability

5 Why are the factors like Confidentiality, Integrity, Availability, and Authenticity
considered as the fundamentals?. Single choice.

Ans: they help understand security and …..

6 Why are the factors like Confidentiality, Integrity, Availability, and Authenticity
considered as the fundamentals?. Single choice.

Ans: true

7. In order to ensure the security of the data/ information, we need to __________


the data
Ans: encrypt

8 _________ is a type of software designed to help the user's computer detect


viruses and avoid them..

Ans: antivirus

9 It can be a software program or a hardware device that filters all data packets
coming through the internet or a network and it is known as the __________.
Ans: firewall
10 Information security threats can be internal as well as external, and they can
be accidental as well as intentional
Ans: true

11 Compromising confidential information comes under _________.. Single choice.


Ans: threat

12 An information security risk is a potential undesirable outcome of a breach of


information security by an information security threat.. Single choice.

Ans: true

13. __________ are those individuals who maintain and handles IT security in any
firm or organization.
Ans: cyber auditor

14 Lack of access control policy is a __

Ans: vulnerability

15. When the database and software library are made available to persons not
entitled to have access it is referred to as unauthorized use.. Single choice.
Ans: true

16. Hackers who help in finding bugs and vulnerabilities in a system & don’t
intend to crack a system are termed as ________.. Single choice.
Ans: gray hat hackers

17. _____ is the practice and precautions taken to protect valuable information
from unauthorized access, recording, disclosure or destruction.. Single choice.
Ans: information security
18. Which type of threat cannot replicate itself within a system, but can transmit
its copies by means of e-mail?. Single choice.

Ans: malware

19. When the firm's purpose for their information infrastructure is to make its
data and information available to those who are authorized to use it, the firm is
seeking the objective of:

Ans: confidenciality

20 Possible threat to any information cannot be _______

Ans: ignored

21. User authorization makes use of access control files that specify the levels of
access available to each user

Ans: true

22. When changes are made to the firm's data, information, and software, the
type of information security risk is:. Single choice.
Ans: unauthorized modification

23 The information security objective of confidentiality is to make its data and


information available to those who are authorized to use it.

Ans: true

24. In the computer networks, the encryption techniques are primarily used for
improving the __________..

Ans: security
25 Which of the following refers to stealing one's idea or invention of others and
use it for their own benefits?. Single choice.

Ans: plagiarism

You might also like