lease circle different types of Cyberattacks: A)      A) Man in the Middle B) Ninja  C) Phishing  D) All     2   Window 95 supported TCP/IP. What is TCP/IP stands for   A)      Transit Control Principle/International Protocol B) Transmission control protocol/Internet protocol C) Transmission Integrity Protocol/International Protocol          D) None   3   A virtual server is a server that shares: A)      Hardware and software resources with other operating systems (OS) B) Share Hardware and  Memory resources   C) Hardware and software resources with one type of operating systems (OS)

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

#

Questions

 

Answers

1

Please circle different types of Cyberattacks:

A)      A) Man in the Middle B) Ninja  C) Phishing  D) All

 

 

2

 

Window 95 supported TCP/IP. What is TCP/IP stands for

 

A)      Transit Control Principle/International Protocol B) Transmission control protocol/Internet protocol C) Transmission Integrity Protocol/International Protocol          D) None

 

3

 

A virtual server is a server that shares:

A)      Hardware and software resources with other operating systems (OS) B) Share Hardware and  Memory resources   C) Hardware and software resources with one type of operating systems (OS)

 

 

4

In 1991 Computer Science graduate at University of Helsinki developed an Operating System Linux based on:

 

A)      Unix   B) LINUX     C) Xenix  D) Windows 3.x   E) None

 

5

What is the purpose of HIPAA act?

A)      Higher education protection   B) Provides data privacy and security to protect medical information. C) Health Insurance and protection for all US Adults

 

 

6

On May 2000 a virus “I Love You” released by student of:

 

A)      USA    B) Russia    C) Philippines   D) Nigeria E) None

 

 

 

 

7

2000 – Sabranes-Oxley Act is?

A)      A federal law that regulate medical industry B) A federal law that established auditing and financial regulations for public companies. C) A federal law that protect credit card data and other sensitive information for students.

 

8

 From 2005-2007 TJ-Maxx data breached happened due to:

 

A) Internal IT Employees stealing and selling data  B) Inadequate backup and storage of data C) Inadequate security of computer system which processed credit card payment D) All

 

 

9

 

 

What are the best practices to secure your login credentials?

 

A)      Use long sentence as a password B) Use 2FA (2 factor authentication)   C) Use strong password D) All

 

 

10

What is industry best practices to secure system?

A)       Don’t allow end users access the system at night or weekend   B) Replace system with new one every 5 years.   C) Don’t connect the system with Internet. D) Update system regularly with secure patch/update.

 

 

11

The UNIX operating system was first developed under the name of:

a)       Linux   b) Xilinx C) Windows NT D) UNIVAC e) None

 

 

12

The T.J. Maxx case is significant for the study of ____________       __________ and its relationship with other professions because its security breach is extensively documented.

 

A)      Retail business B) Market trend  C) Information Security   D) All

 

 

13

The process of converting information or data into a code, especially to prevent unauthorized access known as:

A)      Coding   B) Coding via SSL certificate  C) Encryption D) De-encryption

 

 

 

14

System administration includes the installation, configuration, of network equipment like :

 

a)       Switches B) Routers C) DNS Servers D) None   E) All

 

 

 

 

 

 

15

Encryption as a Cryptographic transformation of data to produce _____________

a)       A) CipherText  B) Plain Text   C) CaesarText D) All

 

 

16

Asymmetric Encryption is a form of Encryption where keys come in ____________. Asymmetric Encryption is also known as ___________________.

 

a)      A) Single   B) Pairs   C) Public Key Cryptography   D) Single Key Cryptography

 

 

17

Who is the first line of defense of all three dimension of Information security?

 

a)       Security officer b) Security analyst c) Database Administrator d) None

 

 

18

 

CIA stands for: ______Confidentiality_____, _________Integrity __________, _____Availability_____________.  (Fill the blank)

 

 

 

19

Software update is the act of replacing defective _______________components with components in which the identified defects have been removed.

A)      Infrastructure Components B) Software C) Virtual Server

 

20

Ciphertext is the text that is ___________________ to the reader.

A)      A) Unintelligible (meaningless)    B) Far away  C) Meaningful  D) All

 

 

 

21

SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a ____________ and _________.

 

A) Browser and User B) Web Server and Database C) Web Server and Browser D) All

 

 

22

What stands for: 

a)       Iaas(Infrastructure as a Service)____________            b) Saas __Software as a Service___________________       c) Paas________(Platform as a Service)_________

Fill the blanks.

 

24

Basic Information Security Model has four components 1) Assets   2) ______Vulnerability_____________________

3) Threats   4)_______Control______.   (Fill the blanks.)

 

 

25

In the context of Information Security an Assets is defined as ____________________ that is to be protected.

A)      Valuable information B) Resource or Information   C)  Part of organization d) Non

 

 

 

Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Security Techniques and tools
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education