[go: up one dir, main page]

0% found this document useful (0 votes)
2K views8 pages

Network Security Source 2

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 8

Prelim Quiz 1

Question 1

Which of these are not part of the reason why we need to secure our network?

The correct answer is: To exploit vulnerabilities in the system

Question 2

Any form of security incident that is not properly handled can and eventually
wont turn into a bigger problem that will lead to a damaging data breach and
wont cause large amount of expense or it will collapse the whole system

The correct answer is 'False'.


Question 3

It will help the company to provide a better strategy in keeping a data secured
while avoiding intruders to alter or steal important and confidential
information.

The correct answer is: Security Trinity


Question 4

System that are intended to manage the computer itself such as the operating
system.

The correct answer is: System Software


Question 5

It ensures that the information in an information system is accurate.

The correct answer is: Integrity

An information that is only accessed by an authorized person.

The correct answer is: Confidential


Question 7

It is considered as a crucial part of information systems

The correct answer is: Security


Question 8

It is a model designed to guide policies for information security within an


organization.

The correct answer is: CIA Triad Information Security


Question 9

It is a structured procedure for taking care of any security incidents,


breaches, and network threats.

The correct answer is: Response


Question 10

Areas of Security Trinity where they need to have a good security measures to
avoid hackers from getting access to the network.

The correct answer is: Prevention


Question 11

Big corporations are not at risks to any form of security breach.


The correct answer is 'False'.
Question 12

Internet is an example of a network.

The correct answer is 'True'.


Question 13

How many key phases are there in an incident response plan ?

Answer:
6
Feedback
The correct answer is: 6
Question 14

It is the tangible parts of a computer system.

The correct answer is: Hardware


Question 15

It has a vital role in an information system because it is the one that allows a
company to link their computers and its users

The correct answer is: Network


Question 16

It is the process of taking preventative measures to keep the network


infrastructure from any unauthorized access, misuse of important information

The correct answer is: Network security


Question 17

Availability refers to the ability of a network to protect its information from


any unauthorized access.

The correct answer is 'False'.


Question 18

It is the network security solution by an institute to Answer


prevent
any malicious activity in a network.

The correct answer is: Detect


Question 19

It determines whether you are allowed to access a specific information or file.

The correct answer is: Authorization


Question 20

System that plays a vital part in Network security since it is the information
that an organization is trying to protect and avoid from any unauthorized access

The correct answer is: Information

PRELIM QUIZ 2

Question 1
It is an act that exploits a vulnerability.

The correct answer is: Attack


Question 2

These are what make networks prone to information loss and downtime

The correct answer is: Vulnerabilities


Question 3

These layers work together to transmit the data from one person to another world
wide.

The correct answer is: OSI Layer


Question 4

It is a set of standards that are widely used as a basis for communication.

The correct answer is: Protocol


Question 5

It has been developed by ISO in the year 1984.

The correct answer is: OSI Reference Model


Question 6

SQL stands for?

The correct answer is: Structured Query Language


Question 7

Two different devices can communicate with each other regardless of the
manufacturer as long as they have the same protocol.

The correct answer is 'True'.


Question 8

Worms can be classified as a type of computer virus that needs a third party or
a user to replicate and spread through the system.

The correct answer is 'False'.


Question 9

A type of malware that automatically sends advertisements to the users.

The correct answers are: Adware, Advertising-supported software


Question 10

What are the signs and symptoms that your device/s are getting infected by any
malware. (Choose all that applies)

The correct answers are: Increased CPU usage, Software freezes or crashes,
Slower computer performance, Appearance of strange desktop icons
Question 11

any program design to damage specific file or computer system.

The correct answer is: Malware


Question 12

This layer is also called human-computer interaction layer.

The correct answer is: Application Layer


Question 13
It pretends to be a legitimate programs in order to gain access to a system.

The correct answer is: Trojan Horse


Question 14

This layer involves devices such as router, UTP Cables and other networking
devices to transfer data.

The correct answer is: Physical Layer


Question 15

It may contain phishing scams and malware.

The correct answer is: Spam


Question 16

Type of malware that may contain an attachment to an email that loads malware
onto your computer system.

The correct answer is: Phishing


Question 17

Which of the following are not part of OSI Layer?

The correct answer is: Transfer Layer


Question 18

Brute force attack are often successful because most of the users uses different
ordinary words as their passwords.

The correct answer is 'False'.


Question 19

It provides data routing paths where data will take for network communication.

The correct answer is: Network Layer


Question 20

It is anything that can disrupt the operation, functioning, integrity, or


availability of a network or system

The correct answer is: Threat

PRELIM EXAM

Question 1

Layer that is responsible for establishing and maintaining connections.

The correct answer is: Session Layer


Question 2

It is an end-to-end layer used to deliver messages to a host

The correct answer is: Transport Layer


Question 3

Type of software that is often called as end-user programs.


The correct answer is: Application Software
Question 4

It is designed to appear as a legit program to gain access to a network.

The correct answer is: Trojan horse


Question 5

Any form of security incident that is properly handled can and eventually will
turn into a bigger problem.

The correct answer is 'False'.


Question 6

Question text
An abbreviation that is consider as the brains of the computer.

The correct answer is: CPU


Question 7

Is the process of using social skills to encourage people to disclose their


credentials

The correct answer is: Social Engineering


Question 8

It's anything that can interrupt the operation, functioning, integrity, or


availability of a network or system.

The correct answer is: Threat


Question 9

Refers to the information system which ensures that the information remains
accurate.

The correct answer is: Integrity


Question 10

Data Link Layer enables data transfer between two devices on the same network.

The correct answer is 'True'.


Question 11

Attack that send an email that contains attachment that loads malware onto your
computer

The correct answer is: Phishing


Question 12

Which of these are not part of the reason why network security is important
(Choose all that applies)

The correct answers are: To expose company assets, To take advantage of


competitors confidential information
Question 13

It is sometimes called TCP hijacking attack.


The correct answer is: Man-in-the-middle attack
Question 14

In implementing network security, company should invest more in preventing or


avoiding any security breach over detecting and responding to any form of attack

The correct answer is 'True'.


Question 15

Is any program that is harmful to a computer user.

The correct answer is: Malware


Question 16

A software that can detect malware.

The correct answer is: Antivirus Software


Question 17

This attack tries to defeat an authentication mechanism by systematically


entering each word in a dictionary as a password.

The correct answer is: Dictionary Attack


Question 18

OSI Layer that is sometimes called HCI layer.

The correct answer is: Application


Question 19

This is a way of adding secondary layer of security to your account password.

The correct answer is: Two-factor authentication


Question 20

It is the foundation for all security policies.

The correct answer is: Security Trinity


Question 21

It is a security solution by organization to notice any malicious activity in a


network.

The correct answer is: Network Detection


Question 22

Information policy where the data should be access by an authorized person/s


only.

The correct answer is: Confidentiality


Question 23

Based with SANS Technology Institute, it is the process of making preventative


measures to keep the underlying networking infrastructure from any unauthorized
access.

The correct answer is: Network Security


Question 24

it is the one managing the computer hardware resources in addition to


applications and data.

The correct answer is: Operating System


Question 25

Combination of brute force and dictionary attack.

The correct answer is: Hybrid


Question 26

Which of these are not part of security model that is very popular to
information security.

The correct answer is: Assurance


Question 27

An attack that allows any unauthorized users a way or passage to get inside a
restricted area.

The correct answer is: Tailgating attack


Question 28

It is a combined set of components for collecting, storing and processing data


and for providing information, facts and knowledge.

The correct answer is: Information System


Question 29

Which of the following is not a way on improving basic security. (Choose all
that applies)

The correct answers are: Ignore Updates, Download software to any website
available, Use easy to remember password, Reuse password
Question 30

It is the connection of two or more computer that share its resources

The correct answer is: Network


Question 31

This attack uses any password-cracking software to mathematically calculate


every possible password.

The correct answer is: Brute-Force Attack


Question 32

It is a type of an injection attack that makes it possible to insert and execute


malicious SQL statements

The correct answer is: SQL Injection


Question 33

It serves as a proof and verifies that you are the person you say you are or
what you claim to be.

The correct answer is: Authentication


Question 34

A set of instructions and execute a specific task/s


The correct answer is: Software
Question 35

Worm has the ability to replicate itself without a host program and spread
independently while viruses rely on human activity to spread and damage a system
or file.

The correct answer is 'True'.


Question 36

An attack where the hacker mimics another employee in the company.

The correct answer is: Impersonation


Question 37

This attack happens when the attacker or hacker sends too much information to
the application causing it to overflow

The correct answer is: Buffer Overflow


Question 38

It has an additional ability where they can modify security settings of a


software.

The correct answer is: Spyware


Question 39

Question text
An act that exploits a weakness in a system.

The correct answer is: Attack


Question 40

Question text
Adware is a type of malware that restricts user access to the computer either by
encrypting files on the hard drive or locking down the system

The correct answer is 'False'.

You might also like