أهلا وسهلا بكم في مدونة
منوعات فلسطينية

الثلاثاء، 17 مايو 2022

Information Security E2

 a- Choose the correct answer and put it in the table below

 1. …………….. are used in denial of service attacks, typically against targeted web sites. A) Worm B) Virus C) Trojan horse D) Zombie E) None of these

 

2. The CIA triad is often represented by which of the following? A) Triangle Diagonal Ellipse Circle E) None of these

 

3. Which of the following malicious program do not replicate automatically? A) Zombie B) Virus C) Worm D) Trojan Horse E) None of these

 

4. A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs. A) Worm B) Trap doors C) Zombie D) Virus E) None of these

 

5. Which of the following is independent malicious program that need not any host program? A) Trap doors B) Worm C) Virus D) Trojan horse E) None of these

 

6. In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Availability B) Authenticity C) Integrity D) Confidentiality E) None of these

 

7. …………… programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly. A) Zombie B) Trojan Horses C) Logic Bomb D) Worm E) None of these

 

8. The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met. A) Logic Bomb B) Trojan horse C) Trap doors D) Virus E) None of these

 

9. Which of the following represents the three goals of information security? A) Prevention, detection, and response B) Confidentiality, integrity, and availability C) People controls, process controls, and technology controls D) Network security, PC security, and mainframe security E) None of these

 

10. In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. A) Authenticity B) Integrity C) Availability D) Confidentiality E) None of these 1 2 3 4 5 6 7 8 9 10 D A C D B C B C B D

 

 

 

b- Define each of the following:

1. Information Security The protection of information and its elements including systems, HW that use, store and transmit the information.

 

2. Encryption Convert the plaintext (original message) from readable to unreadable message

 

3. Plaintext and Ciphertext (plaintext is readable message and ciphertext is unreadable message)

ليست هناك تعليقات:

إرسال تعليق