lease circle different types of Cyberattacks: A) A) Man in the Middle B) Ninja C) Phishing D) All 2 Window 95 supported TCP/IP. What is TCP/IP stands for A) Transit Control Principle/International Protocol B) Transmission control protocol/Internet protocol C) Transmission Integrity Protocol/International Protocol D) None 3 A virtual server is a server that shares: A) Hardware and software resources with other operating systems (OS) B) Share Hardware and Memory resources C) Hardware and software resources with one type of operating systems (OS)
# |
Questions
|
Answers |
1 |
Please circle different types of Cyberattacks: A) A) Man in the Middle B) Ninja C) Phishing D) All
|
|
2
|
Window 95 supported TCP/IP. What is TCP/IP stands for
A) Transit Control Principle/International Protocol B) Transmission control protocol/Internet protocol C) Transmission Integrity Protocol/International Protocol D) None |
|
3
|
A virtual server is a server that shares: A) Hardware and software resources with other operating systems (OS) B) Share Hardware and Memory resources C) Hardware and software resources with one type of operating systems (OS)
|
|
4 |
In 1991 Computer Science graduate at University of Helsinki developed an
A) Unix B) LINUX C) Xenix D) Windows 3.x E) None |
|
5 |
What is the purpose of HIPAA act? A) Higher education protection B) Provides data privacy and security to protect medical information. C) Health Insurance and protection for all US Adults
|
|
6 |
On May 2000 a virus “I Love You” released by student of:
A) USA B) Russia C) Philippines D) Nigeria E) None |
|
7 |
2000 – Sabranes-Oxley Act is? A) A federal law that regulate medical industry B) A federal law that established auditing and financial regulations for public companies. C) A federal law that protect credit card data and other sensitive information for students. |
|
8 |
From 2005-2007 TJ-Maxx data breached happened due to:
A) Internal IT Employees stealing and selling data B) Inadequate backup and storage of data C) Inadequate security of computer system which processed credit card payment D) All
|
|
9
|
What are the best practices to secure your login credentials?
A) Use long sentence as a password B) Use 2FA (2 factor authentication) C) Use strong password D) All
|
|
10 |
What is industry best practices to secure system? A) Don’t allow end users access the system at night or weekend B) Replace system with new one every 5 years. C) Don’t connect the system with Internet. D) Update system regularly with secure patch/update.
|
|
11 |
The UNIX operating system was first developed under the name of: a) Linux b) Xilinx C) Windows NT D) UNIVAC e) None
|
|
12 |
The T.J. Maxx case is significant for the study of ____________ __________ and its relationship with other professions because its security breach is extensively documented.
A) Retail business B) Market trend C)
|
|
13 |
The process of converting information or data into a code, especially to prevent unauthorized access known as: A) Coding B) Coding via SSL certificate C) Encryption D) De-encryption
|
|
14 |
System administration includes the installation, configuration, of network equipment like :
a) Switches B) Routers C) DNS Servers D) None E) All
|
|
15 |
Encryption as a Cryptographic transformation of data to produce _____________ a) A) CipherText B) Plain Text C) CaesarText D) All
|
|
16 |
Asymmetric Encryption is a form of Encryption where keys come in ____________. Asymmetric Encryption is also known as ___________________.
a) A) Single B) Pairs C) Public Key Cryptography D) Single Key Cryptography
|
|
17 |
Who is the first line of defense of all three dimension of Information security?
a) Security officer b) Security analyst c)
|
|
18
|
CIA stands for: ______Confidentiality_____, _________Integrity __________, _____Availability_____________. (Fill the blank) |
|
19 |
Software update is the act of replacing defective _______________components with components in which the identified defects have been removed. A) Infrastructure Components B) Software C) Virtual Server |
|
20 |
Ciphertext is the text that is ___________________ to the reader. A) A) Unintelligible (meaningless) B) Far away C) Meaningful D) All
|
|
21 |
SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a ____________ and _________.
A) Browser and User B) Web Server and Database C) Web Server and Browser D) All
|
|
22 |
What stands for: a) Iaas(Infrastructure as a Service)____________ b) Saas __Software as a Service___________________ c) Paas________(Platform as a Service)_________ Fill the blanks. |
|
24 |
Basic Information Security Model has four components 1) Assets 2) ______Vulnerability_____________________ 3) Threats 4)_______Control______. (Fill the blanks.)
|
|
25 |
In the context of Information Security an Assets is defined as ____________________ that is to be protected. A) Valuable information B) Resource or Information C) Part of organization d) Non
|
|
Step by step
Solved in 2 steps