Reaction in data security is:
Question 1 options:
Actions which regularly support the measures which were implemented to protect the data | |
Planned measures to minimize the damage after an incident. | |
None of the listed choices are correct. | |
An action taken in advance to protect the system against threats or dangers |
What is Confidentiality?
Question 2 options:
It ensures that the information is accurate, complete, reliable, and is in its original form. | |
It refers to data being known or accessible to only authorized users. | |
It refers to the truthfulness of the origin of data. | |
It ensures that once the user captures the data in a computer system, it must make the data available to the users when they request it. |
What is Authenticity?
Question 3 options:
It ensures that once the user captures the data in a computer system, it must make the data available to the users when they request it. | |
It refers to data being known or accessible to only authorized users. | |
It refers to the truthfulness of the origin of data. | |
It ensures that the information is accurate, complete, reliable, and is in its original form. |
What is Non Repudiation?
Question 4 options:
It refers to the truthfulness of the origin of data. | |
It ensures that once the user captures the data in a computer system, it must make the data available to the users when they request it. | |
It ensures that the sender and receivers of the message are accurate. | |
It ensures that the information is accurate, complete, reliable, and is in its original form. |
View hint for Question 4 |
Question 5 (4 points)
How often do we generate data?
Question 5 options:
Only when we are working | |
Continuously even when not awake. | |
Only when we are working on something of value. | |
Only when you save a document |
What is Availability?
Question 6 options:
It ensures that the information is accurate, complete, reliable, and is in its original form. | |
It refers to data being known or accessible to only authorized users. | |
It ensures that once the user captures the data in a computer system, it must make the data available to the users when they request it. | |
It refers to the truthfulness of the origin of data. |
Precaution for data security is:
Question 7 options:
An action taken in advance to protect the system against threats or dangers | |
Actions which regularly support the measures which were implemented to protect the data | |
Planned measures to minimize the damage after an incident. | |
None of the above. |
Your Windows Defender detects a run time virus, what should I do?
Question 8 options:
Ignore it. | |
Forward it as an attachment to IT. | |
Repair, delete, or quarantine the file. | |
Save it on a USB drive for later investigation. |
What is a Trojan?
Question 9 options:
They are the most commonly used type of malware. It’s a program which enters an operating system with the intention of spreading malicious code. | |
This malware spies on user activity without their knowledge. | |
They are a destructive program that parades itself as a harmless application | |
They are just like biological counterparts. They spread rapidly, their spreading is accelerated or mitigated by human actions and they are harmful to their host’s health |
What is ransomware?
Question 10 options:
It is malicious software designed to remotely access or control a computer without alerting the users or the security programs. | |
They are the most commonly used type of malware. It’s a program which enters an operating system with the intention of spreading malicious code. | |
It is a malware which prevents users from accessing their computer systems unless a payment is made. | |
This malware spies on user activity without their knowledge. |
Which of the following antivirus software functions isolate files suspected of being infected with malware after detection?
Question 11 options:
Retry | |
Quarantine | |
Delete | |
Ignore |
What is a worm?
Question 12 options:
They are just like biological counterparts. They spread rapidly, their spreading is accelerated or mitigated by human actions and they are harmful to their host’s health. | |
This malware spies on user activity without their knowledge. | |
They are the most commonly used type of malware. It’s a program which enters an operating system with the intention of spreading malicious code. | |
They are a destructive program that parades itself as a harmless application. |
What is an antivirus?
Question 13 options:
It is a software application that detects and eradicates malware from a computer system. | |
It prevents unwanted network scans. | |
It blocks bulk commercial email. | |
It’s 100% foolproof method to protect your device. |
You accidentally open an executable attached to an email from an unknown source. Nothing seems to be wrong or happening, what should I do next?
Question 14 options:
Delete the email and reboot the PC. | |
Open and run an antivirus program on full scan. | |
Forward the email to the IT administrators. | |
Do nothing it should be fine. |
How does a virus differ from ransomware?
Question 15 options:
Ransom wear attacks the operating system with the intent of spreading malicious code. | |
Viruses attack the operating system with the intent of spreading malicious code. | |
Viruses are destructive applications for the sake of being destructive with no intent to extort money from their victims. | |
Viruses are generally use encryption to extort money from the victims. |
You turn on your PC and notice that your Windows operating system is running slowly and your third party antivirus is not running. What should you do?
Question 16 options:
Purchase and install a different third party antivirus. | |
Reboot your PC. | |
Format the HD and start over. | |
Turn on Windows Defender and run a full scan. |
How does a worm and Trojan horse differ?
Question 17 options:
Worms generally attack the user’s data, encrypting them for ransom. | |
Trojan horses are commonly hide themselves as useful/harmless applications. | |
Worms generally hide themselves as a useful/harmless application. | |
Trojan horses disrupt normal operations by flooding the network with traffic. |
Even though the terms data and information are often used interchangeably, there is a distinction between them. What is that distinction?
Question 18 options:
7 character difference. | |
Information is processed data which conveys a specific meaning and is of substantial value. | |
Data is processed information. | |
Data can be stolen while information cannot. |
Which of the following is true about organizational data?
Question 19 options:
Protecting data owned by commercial entities are the sole responsibility of the company. | |
Organizational data are often subject to intentional theft by market competitors. | |
Personal and organizational data are always stored separately. | |
Organizational data is always on company owned PC’s and phones. |
Data belonging to commercial entities, if leaked, can wreak havoc on them. Which of the following are implications of a data breach?
Question 20 options:
All displayed answers are correct. | |
Loss of intellectual property. | |
Loss of productivity. | |
Loss of reputation. |
One of the last Padgett Beale campgrounds that used a telephone reservation and cash only process has decided to accept credit cards through the use of a portable credit card reader service (e.g. Square) through a smart phone. What are the risks to the campground?
Question 21 options:
Malware/Spyware may steal customer information | |
Loss of credit card reader | |
The loss of the phone will result in theft of customer information. | |
Loss of cell phone connection |
Padgett Beale’s General Manager for Robenia’s Guest House has notified staff members that a group of foreign dignitaries will be staying at the property for a nearby conference. She has asked that the names, titles, and rooms of the guests be protected for operational security reasons. Which information security function should PBI’s IT department focus on?
Question 22 options:
Availability. | |
Integrity | |
Continuity | |
Confidentiality |