Is Question1
Is Question1
1 its data and information available to those who are authorized to use it,
the firm is seeking the objective of:
confidentiality.
availability.
authorization.
integrity.
2
What is the activity of keeping the firm and its information resources
functioning after a catastrophe?
Corporate information assurance
3
Which statement based on a survey by the Computer Security Institute
is false?
Twenty-three percent of the respondents faced security incidents brought on by
actions of legitimate users.
Employees commit 81% of computer crimes.
Internal threats are considered to present potentially more serious damage than
do external threats.
Controls that are put in place to address external threats typically go into action
when an effort to breach security is detected.
4
When changes are made to the firm's data, information, and software,
the type of information security risk is:
unauthorized disclosure and theft.
unauthorized use.
Which type of threat cannot replicate itself within a system, but can
5 transmit its copies by means of e-mail?
Malware
Virus
Worm
Trojan horse
6
Which of the following is not an expected security-related practice for
retailers that Visa has established?
Destroy data when it is no longer needed.
Information classification
9
Which type of control protects stored and transmitted data and
information against unauthorized disclosure?
Technical control
Access control
Cryptographic control
Physical control
SANS Institute
11. Involving the protection of individual or group of individuals who are authorized to access
the organization and its operation
Physical Security
Personal Security
Operation Security
Information Security
12. Computer A has data and it is available to only to authorized users this category is
described as
Authenticity
Confidentiality
Accuracy
Availability
13. File hashing is introduced to read a value as bits and computer a single hash value
Utility
Possession
Integrity
Information Security
14. Selecting the Technology need to support security blueprint is performed at which step in
Security SDLC.
Analysis
Logical Design
Physical Design
Implementation
16. Among the components Listed which is not addressed in CNSS Security Model
Availability
Transmission
Policy
Authenticity
18. Breaches are an employee throwing away a document containing critical information without
shredding it
Authenticity
Confidentiality
Accuracy
Availability
19. Under the Mentioned List which is not components of information security
Hardware
Software
Data
Information access
1.a-b-c-d-e-f
2.a-c-b-d-f-e
3.a-c-d-b-e-f
4.a-c-d-b-f-e
Unit-II
21. Information security performs important functions for an organization; Find the functionality
which is not covered by Information Security
22. Unauthorized access and data collection is categorized as which type of attack
Virus
Tapeworm
Trojan Horses
Back door
24. These viruses and worms actually evolve, changing their size and other external file
characteristics to elude detection by antivirus software programs.
25. In 1997, the core of the Internet suffered a disaster. Internet service providers lost
connectivity with other ISPs due to an error in a routine Internet routertable update process, The
resulting outage effectively shut down a major portion of the Internet for at least twenty minutes.
It Occurred due to
Information extortion
Missing, inadequate planning
Sabotage
Human Error
26. Selecting specific target accounts and using a list of commonly used passwords attack is
refereed as
Brute Force
Dictionary attack
Password Crack
Spoofing
27.It can be used both for legitimate network management functions and for stealing information
Mail bomb
Sniffer
Social engineering
Phishing
28. When a user executes the program, the users name and password are e-mailed to a remote
site. These messages can appear to be from a site administrator or root. In reality, they may have
been sent by an individual at a remote site, who is trying to gain access or additional access to
the local machine via the users account, this attack is termed as
Pharming
Timing attack
Social engineering
Phishing
29. A discipline within the area of computer security attempts to identify the activities involved
in creating secure systems
Software assurance
Vandalism
Technological obsolescence
Information extortion
30. Using vulnerabilities in file systems and the way many organizations configure them, the
infected machine copies the viral component to all locations it can reach.
Web browsing
IP scan and attack
Unprotected shares
Mass mail