Search Header Logo
Digital Security Risk and Measures

Digital Security Risk and Measures

Assessment

Presentation

•

Information Technology (IT)

•

University

•

Practice Problem

•

Medium

Created by

Forcia Batoctoy

Used 4+ times

FREE Resource

67 Slides • 25 Questions

1

media

2

media

3

media

4

media

5

media

6

media

7

Multiple Select

Which of the following a unpublished information?

1

Book Title

2

Minutes of the Meeting

3

Newspaper

4

Diaries

5

Website

8

Multiple Choice

Which statement define a publish information?

1

refers to content that has been formally released and made publicly accessible through recognized channels

2

refers to data, documents, or works that have not been formally released to the public or distributed through official publishing channels

9

media

10

media

11

media

12

media

13

media

14

media

15

media

16

media

17

media

18

media

19

Multiple Choice

A technique that is used to masquerade as someone such as a superior, person from an information systems department, or customer

1

Instrusion

2

Spoofing

3

Peeping

4

Theft

20

Multiple Choice

The act of looking at someone’s keyboard while they are entering a password

1

Instrusion

2

Spoofing

3

Peeping

4

Theft

21

Multiple Choice

refers to the act of intruding on a system without authorization to remove important and confidential information from within the system

1

Instrusion

2

Spoofing

3

Peeping

4

Theft

22

media

23

media

24

Multiple Choice

The first phase of the computer virus' life cycle

1

Appearance of Symptoms

2

Infection

3

Dormancy

25

Multiple Choice

The second phase of the computer virus' life cycle

1

Appearance of Symptoms

2

Infection

3

Dormancy

26

Multiple Choice

The last phase of the computer virus' life cycle

1

Appearance of Symptoms

2

Infection

3

Dormancy

27

media

28

media

29

Multiple Choice

Which type of symptoms causes destruction to the OS as the basic software, or cause destruction to application software?

1

Data Desctuction

2

Screen Display Destruction

3

Program Destruction

30

Multiple Choice

Which type of symptoms suddenly display objects on the screen of the display, such as pictures, graphics, or characters?

1

Data Desctuction

2

Screen Display Destruction

3

Program Destruction

31

media

32

media

33

media

34

media

35

media

36

media

37

media

38

media

39

Multiple Choice

An attempt to disable the functions of a server by overloading the server

1

Phishing

2

Cross-site scripting

3

E-mail bomb

4

DoS Attack

40

Multiple Choice

refers to the use of computer with weak security as a cloaked base for a cracker to attack a target system

1

Stepping Stone

2

Port Scan

3

Password Crack

4

DoS Attack

41

Multiple Choice

The process of engaging in analysis to discover a username and password

1

Stepping Stone

2

Port Scan

3

Password Crack

4

DoS Attack

42

Multiple Choice

a type of security hole vulnerability in software that destroy files on a computer when a user views a malicious website containing embedded code

1

Phishing

2

Cross-site scripting

3

E-mail bomb

4

DoS Attack

43

media

44

media

45

media

46

media

47

media

48

media

49

media

50

media

51

media

52

media

53

media

54

media

55

media

56

media

57

media

58

media

59

media

60

Multiple Choice

Is it recommended that in the event of a suspected virus infection, the system should continue running to avoid disruption, and the security administrator should be notified at the end of the day?

1

True

2

False

61

Multiple Choice

A security policy's purpose is to realize a unified approach to information security across an organization

1

True

2

False

62

Multiple Choice

A DMZ (DeMilitarized Zone) is described as a network area located between the company network and an external network like the Internet, where public-facing servers are placed.

1

True

2

False

63

Multiple Choice

Passwords should be changed regularly and can be written down on paper if kept in a secure location.

1

True

2

False

64

media

65

media

66

media

67

media

68

media

69

media

70

media

71

Multiple Choice

Entrance access control only refers to controlling who has access to a building and does not involve keeping records of when access occurs

1

True

2

False

72

Multiple Choice

Locking is described as the basic method of entrance access control, similar to setting a password for a computer

1

True

2

False

73

Multiple Choice

Maintaining manual records of movement presents challenges for users, who may improperly record information, making strict access control difficult.

1

True

2

False

74

Multiple Choice

Biometric authentication is defined as a technology that uses behavioral patterns like typing speed for identity verification

1

True

2

False

75

media

76

media

77

media

78

media

79

media

80

media

81

media

82

media

83

media

84

media

85

media

86

media

87

media

88

media

89

Multiple Choice

Which of the following is NOT mentioned as a challenge of managing backup data?

1

The high cost of unlimited technical personnel and budgets

2

Protecting backup data from being targeted by cybercriminals

3

Coordinating backup windows to avoid performance degradation.

4

Dealing with large and continuously growing volumes of data.

90

Multiple Choice

A differential backup strategy copies which of the following?

1

All data every time it is performed.

2

Only the data that has changed since the last full backup.

3

Only the data that has changed since the last backup of any type.

4

Data is copied in its entirety only the first time.

91

Multiple Choice

What is a key reason for the importance of data backups in relation to ransomware attacks?

1

Backups are used to pay the ransom and decrypt the files.

2

Backups can actively prevent a ransomware infection from occurring

3

Backups automatically isolate the infected machine from the network.

4

Backups allow an organization to revert to a clean, unencrypted copy of its data.

92

media
media

Show answer

Auto Play

Slide 1 / 92

SLIDE