0% found this document useful (0 votes)
23 views3 pages

Ismt Prelim

The document outlines key concepts and principles of computer security, including the objectives of confidentiality, integrity, and availability (CIA). It discusses various types of attacks, security measures, and policies, as well as the importance of risk assessment, incident response, and employee training. Additionally, it covers regulations like GDPR and HIPAA, and best practices for data protection and password security.

Uploaded by

aronlat21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views3 pages

Ismt Prelim

The document outlines key concepts and principles of computer security, including the objectives of confidentiality, integrity, and availability (CIA). It discusses various types of attacks, security measures, and policies, as well as the importance of risk assessment, incident response, and employee training. Additionally, it covers regulations like GDPR and HIPAA, and best practices for data protection and password security.

Uploaded by

aronlat21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

ISMT311 PRELIM

Quiz
●​ What is the primary objective of computer security?
o​ Prevent unauthorized access and ensure data confidentiality,
integrity, and availability
●​ According to NIST, computer security includes measures to ensure:
o​ Confidentiality, Integrity, and Availability
●​ What does confidentiality mean in computer security?​
o​ Preventing unauthorized access to information
●​ Which concept ensures that data is accurate and unaltered?
o​ Integrity
●​ What does availability ensure in computer security?
o​ Data is always accessible and operational
●​ What is threat to cybersecurity?
o​ A potential circumstance that could exploit a vulnerability
●​ What is vulnerability?
o​ A weakness in a system that can be exploited
●​ What is an example of a passive attack?
o​ Eavesdropping on network traffic
●​ What is an example of an active attack?
o​ Altering financial transaction records
●​ An insider attack is initiated by:
o​ Someone with the organization
●​ What is a security policy?
o​ A formal set of rules defining security requirements
●​ What is the main purpose of access control?
o​ To restrict access to authorized users
●​ Which countermeasure prevents security threats?
o​ Installing a firewall
●​ Which of the following is an example of authentication?
o​ Using a username and password
●​ What is the principle of least privilege?
o​ Users should only have the access necessary for their tasks
●​ A denial-of-service (DoS) attack aims to:
o​ Make a system unavailable
●​ What is a masquerade attack?
o​ When an attacker pretends to be an authorized user
●​ A replay attack involves:
o​ Resending previously captured data to gain unauthorized access
●​ What is phishing?
o​ A technique used to trick users into revealing sensitive information

●​ What is an example of physical security control?


o​ encryption algorithm
o​ biometric authentication
o​ CCTV surveillance
o​ intrusion detection system
●​ Which technique protects data in transit?
o​ Intrusion detection, Permission, Antivirus software, SSL encryption
●​ What is a 2-factor of authentication?
o​ A security process requiring two forms of identification to access an
account.
●​ Firewall is used to
o​ Block unauthorized access to a network.
●​ Which security principle ensures users are aware of security risks?
o​ Security awareness in training
●​ What is the purpose of risk assessment?
o​ To identify, evaluate, and prioritize potential security risks to
minimize their impact.
●​ What does incident response involve?
o​ Detecting, analyzing, containing, and recovering from cybersecurity
incidents.
●​ CIA stands for
o​ Confidentiality, Integrity, and Availability
●​ What does encryption do?
o​ Converts data into an unreadable format to prevent unauthorized
access.
●​ Which organization defines cyber security standards?
o​ NIST
●​ What is the economic mechanism principle in security?
o​ The idea that security investments should be cost-effective and
based on risk assessment.
●​ What is a fail safe default?
o​ A security principle that denies access by default and grants
permissions only when explicitly allowed.
●​ Separation of privilege and security means
o​ Granting users only the minimum level of access needed to perform
their tasks.
●​ What does open design mean in security?
o​ Security mechanisms should be open and transparent, relying on
strong design rather than obscurity.
●​ Zero-day attack
o​ An attack that exploits a previously unknown software vulnerability
before a fix is available.
●​ Malware refers to
o​ A type of software designed to harm, exploit, or disrupt computers
and networks.
●​ Trojan horse
o​ A type of malware that disguises itself as legitimate software to
trick users into installing it.
●​ What is ransomware?
o​ A type of malware that encrypts files and demands payment for
their release.
●​ What is spyware?
o​ A type of malware that secretly gathers user information and
transmits it without consent.
●​ What is VPN used for?
o​ Encrypting internet traffic to protect data and privacy online.
●​ What does HTTPS provide in web communication?
o​ Encryption, authentication, and data integrity for secure
communication.
●​ Symmetric encryption uses
o​ The same key for both encryption and decryption.
●​ What does hashing do to a data?
o​ Converts data into a fixed-length unique string that cannot be
reversed.
●​ What is a security audit?
o​ A systematic evaluation of an organization's security policies,
controls, and practices to identify vulnerabilities.
●​ What is the purpose of security monitoring?
o​ To continuously track and analyze system activity for potential
threats and security incidents.
●​ What is penetration testing is used to
o​ Identify and exploit security vulnerabilities in a system to assess its
defenses.
●​ What does intrusion detection do
o​ Monitors networks and systems for suspicious activity and alerts
security teams.
●​ What does GDPR regulate?
o​ data privacy and security to protect individuals’ personal
information.
●​ What is HIPAA (Health Insurance Portability and Accountability Act)
o​ Medical and health related data
●​ Where is PCIDSS (Payment Card Industry Data Security Standard)
applied to?
o​ Credit card transactions
●​ What is FISMA?
o​ Federal information system management act
●​ What is patch management?
o​ process of regularly updating software, operating systems, and
applications to fix security vulnerabilities, improve performance,
and ensure compatibility.
●​ What is the best practice for creating strong passwords?
o​ Mix of uppercase, lowercase, numbers, and symbols.
●​ Why should users avoid clicking unknown email links?
o​ They can lead to various cybersecurity threats, including malware
infections, phishing attacks, and identity theft.
●​ What is the best way to backup sensitive data?
o​ Combining encryption, redundancy, automation, and access control
to ensure sensitive data remains protected and recoverable.
●​ What is the main goal of cybersecurity laws?
o​ to protect individuals, organizations, and governments from cyber
threats by establishing legal standards for data security, privacy,
and online safety.
●​ Why is employee training security important?
o​ It helps protect both the organization and its employees from
cybersecurity threats, data breaches, and other security risks.

You might also like