MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Quiz
Computer Science
Information Security
Quiz 2
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Q.1
Which of the following are consider physical security risks?
Hardware theft
password cracking
phishing
cooking
Q.2
Which of the following may result in a malware infection?
Opening an email attachment
Downloading a file from a website
Clicking on an infected link
All of the above
Q.3
Which of the following is not effective in preventing malware infections?
Opening email attachments
Turning on Windows Automatic Updates
Installing anti-virus software
Setting Internet Explorer's security setting to medium-high
Q.4
What does a keylogger do?
provides
prevents certain data from being entered
encrypts data entered with a keyboard
tracks a user's keystrokes on the keyboard
Q.5
Which legislation covers data protection through wire and electronic transmissions of data?
CFAA
ECPA
HIPAA
SOX
Q.6
Which statements represent elements of the three aspects of the CIA security triad?
Permissions should be given to department managers to ensure data access.
All data should be password protected.
Data should only be changed by authorized users.
All of above
Q.7
Which is true regarding a secure cookie?
The cookie contents are encrypted.
The cookie can only be sent with https.
The cookie can be sent with http or https.
Both A & B
Q.8
Which refers as the practice of protecting information by mitigating information risks.
Vulnerability
Information Security
Vectors
Application
Q.9
If a file has been altered without permission or knowledge, this violates the principle of ____.
encryption
integrity
least privilege
confidentiality
Q.10
Which security technique is provided by using multiple levels of protection, such as firewalls, antimalware software, and strong password policies?
Integrity
Nonrepudiation
Defense in depth
Principle of least privilege
Q.11
Which security domain secures Supervisory Control and Data Acquisition (SCADA) systems, such as a citywide electrical grid?
System
WAN
LAN
Remote Access
Q.12
A computer that does not have any antimalware programs installed represents a ____ to data.
threat
vulnerability
payload
time bomb
Q.13
A computer has been infected with malware that allows the hacker to access the computer through a backdoor from a distant location. What is the most likely example of the malware on this machine?
Trojan horse
Logic bomb
Remote access Trojan
Armored virus
Q.14
___ is malware that prevents legitimate access to data by encrypting the data content.
Drive-by-download
Polymorphic
Worm
Ransomware
Q.15
There has been a fire in your office building, all computers have been damaged
Phone the technician
Use on site back up
Keep paper copies of customer information
Use off site back up
Q.16
The action or intent of a virus is called its ____.
threat
payload
design
strategy
Q.17
A user unknowingly visits a webpage that has been compromised with ransomware, which was downloaded to the user’s device. This is an example of a ____.
vulnerability
crypto-infection
drive-by-download
nonrepudiation process
Q.18
Microsoft documents can be easily compromised by ____.
time bombs
ransomware
rootkits
macro viruses
Q.19
A(n) ____ exists in software when it was released and remains unknown until it is exploited by hackers.
adware
bug
zero-day vulnerability
weak app
Q.20
A virus has infected your computer system, employee records cannot be opened
Back up information regularly (on site or off site)
Keep a bundle of paper employee details on your desk
Restrict physical access around the office
Re-enter all employee data into the system when this happens
0 h : 0 m : 1 s
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqgeeks.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page