0% found this document useful (0 votes)
5 views1 page

01 Quiz. Final

The document consists of a quiz related to information security concepts, vulnerabilities, and types of malware. It includes multiple-choice questions and fill-in-the-blank prompts that assess knowledge on data integrity, confidentiality, and security practices. The quiz covers various topics such as access control, types of attackers, and specific vulnerabilities in software systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views1 page

01 Quiz. Final

The document consists of a quiz related to information security concepts, vulnerabilities, and types of malware. It includes multiple-choice questions and fill-in-the-blank prompts that assess knowledge on data integrity, confidentiality, and security practices. The quiz covers various topics such as access control, types of attackers, and specific vulnerabilities in software systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

ITE-311-CHAPTER 1-QUIZ-1. (Write your answer on the blank, Letter 1.

______This can lead to a system crash, data compromise, or


only) provide escalation of privileges.
NAME:_______________________________________________ 2. ______In this security vulnerabilities, Data could be designed to
force the program to behave in an unintended way
1. ______ Another term for ___________ would be privacy 3. ______In this security vulnerabilities, The maliciously crafted
2. ______Which of the guidelines for information security for dimensions could force the program to allocate buffers of incorrect
organization is being practised in the example, a programmer and unexpected sizes.
shouldn’t have access to the personal information of the employees. 4. ______In this vulnerability ,it becomes a source of vulnerability
3. ____________ is accuracy of the data during its entire life cycle when the required ordered do not occur in the correct order
4. _____________ is consistency of the data during its entire life cycle 5. ______In this vulnerability, one of the solution is the process of
5. _____________ is trustworthiness of the data during its entire life controlling who does what and ranges from managing physical
access to equipment to dictating who has access to a resource,
cycle
6. ______In this vulnerability, one of the solution is to dictate who has
6. ______Which of the guidelines for information security for access to a certain file, and what they can do with it
organization is being practised in the example, Data must be 7. ______In this vulnerability, the results of its improper use has
unchanged during transit and not changed by unauthorized entities resulted in many security vulnerabilities.
7. ______File permissions and user access control can prevent 8. _______________ design to track and spy on the user
unauthorized access. Which of the guidelines for information 9. _________ often includes activity trackers, keystroke collection, and
security for organization is being practised? data capture
8. ______Version control can be used to prevent accidental changes 10. ______in an attempt to overcome security measures, ___________
by authorized users. Which of the guidelines for information security often modifies security settings.
for organization is being practised? 11. _______________ often bundles itself with legitimate software or
9. ______Backups must be available to restore any corrupted data. with Trojan horses
Which of the guidelines for information security for organization is 12. ______In This type of Malware, Advertising supported software is
being practised? designed to automatically deliver advertisements
10. ______To ensure the ________ of the network and data, one of the 13. ______one increasing use of this type of malware are the Botnets.
14. ______Several computers are infected with _______ which are
things needed to be done is to maintain the equipment. programmed to quietly wait for commands provided by the attacker
11. ______Perform hardware repairs if there are any problems is being 15. ______In this vulnerability ,it becomes a source of vulnerability
done to ensure the __________ of the data. when the required timed events do not occur in the proper timing.
12. ______Perform and installing update to the operating systems is 16. ______In this vulnerability, it was stated that Systems and sensitive
being done to ensure the __________ of the data. data can be protected through techniques such as authentication,
13. ______To ensure the _________ of the network and data, we need authorization, and encryption.
to make sure to keep the software updated. 17. ______Some other versions of this can take advantage of specific
14. ______By creating backups of data, the ___________ of data is system vulnerabilities to lock down the system
being ensured. 18. ____________, is spread by a downloaded file or some software
15. ______By making plans to recover quickly from disasters, we are vulnerability.
ensuring the __________ of the data. 19. ______This is a type of malware designed to persuade the user to
16. ______One of the things being done to ensure the _____________ take a specific action based on fear
of the network, we use security equipment and software to guard 20. _________, forges pop-up windows that resemble operating system
dialogue windows
against downtime due to attacks.
21. ______In this type of malware, windows convey forged messages
17. ______They are sometimes called Script Kiddies. Which type of stating the system is at risk or needs the execution of a specific
attackers are they? program to return to normal operation
18. ______Usually with no or little skill, usually using tools that are 22. ______This vulnerability occurs when data is written beyond the
already existing. Which type of attackers are they? limits of a buffer
19. ______Some cause harm by showing their skills. Which type of 23. ______It overflows the memory areas allocated to an application
attackers are they? 24. ______By changing data beyond the boundaries of a __________,
20. ______The results of their attack can be still devastating even use the application accesses memory allocated to other processes
basic tools. Which type of attackers are they? 25. ____________ is often installed with some versions of software
21. ______To gain access is one of the reason they break into 26. ______Some ____________ is designed to only deliver
networks and computers. Who are they? advertisements
22. ______One of their purpose into breaking in is to discover 27. ______it is also common for____________ to come with spyware.
weakness so the security could be improve, these are done with 28. _________ is malware designed to automatically perform action,
usually online
permission. Who are they?
29. ______In this vulnerability, it was stated that Developers should not
23. ______One of their purpose of their break-in is to take advantage of attempt to create their own security algorithms because it will likely
any vulnerability for illegal personal, financial or political gain. Who introduce vulnerabilities
are they? 30. ______In this vulnerability, it was stated that it is strongly advised
24. ______One of their purpose is may find a vulnerability in a system that developers use security libraries that have already created,
then may report the vulnerability to the owners of the system if that tested, and verified
action coincides with their agenda. 31. ______This malware is designed to hold a computer system or the
25. ______One of the things they do is when they found a vulnerability, data it contains captive until a payment is made
they publish facts about it online so that others can exploit it. 32. ____________ usually works by encrypting data in the computer
26. ______They are usually groups focused on control, power and with a key unknown to the user
wealth. Who are they? 33. ______In this security vulnerabilities, data coming into the program
27. ______They may even provide cybercrime as a service to other could have malicious content,
criminals. Who are they? 34. ______This vulnerability is when the output of an event depends on
ordered or timed outputs
28. ______Some of them make political statements to create
awareness to issues that are important to them. Who are they?
29. ______Some of them gather intelligence or commit sabotage on a) Access-Control Problems
behalf of their government. Who are they? b) Adware
30. ______Some of them are highly trained and well-funded, and their c) Bot
attacks are focused on specific goals that are beneficial to their d) Buffer overflow
government. Who are they? e) Non-validated input
f) Race Conditions
a. Amateurs g) Ransomware
b. Authority h) Scareware
c. Availability i) Spyware
d. Confidentiality j) Weakness in Security practices
e. Hackers
f. Integrity
g. Organized Hackers
h. Professional
ITE-311-CHAPTER 2-QUIZ-1. (Write your answer on the blank, Letter
only)
NAME:_______________________________________________

You might also like