You are on page 1of 5

A risk is a threat that a resource, for example a computer, may be

compromised.
True
False
Feedback
Correct. A risk is a threat that a resource may be compromised.
Question 2
Points: 10 out of 10
Its more important to understand risk and compromise than it is to use
strong passwords.
true
false
Feedback
Correct. Understanding risk and compromise are additional aspects of your
responsibility and capability to protect your information and resources.
Question 3
Points: 10 out of 10
Sam downloaded a game and later found out that a keylogger had been
installed on his computer. Which aspect of his resource (the data on his
computer) has been compromised?
Integrity
Availability
Confidentiality
Feedback
Correct. Clearly, if a program is logging all of Sams keystrokes, the
confidentiality of what is stored on his computer, including his personally
identifiable information, has been compromised.
Question 4
Points: 10 out of 10
Jeff starts writing a report for one of his classes. Since the report is similar to a
previous one he has written, he opens the previous report, makes changes, and
re-saves the report, replacing the earlier version. Later he discovers that he
still needs the first report. Which aspect of his resource (the first report) has
been compromised?
Availability
Confidentiality
Integrity
Feedback
Correct. Because Jeff no longer has the first report because he has saved the
new report over the old, his resource is no longer available.
Question 5
Points: 10 out of 10
In the scenario below, identify which of the three dimensions is primarily
threatened or compromised.
The constant popups on his computer are making it difficult for Alfonso to
accomplish work that involves being on the Internet.
confidentiality
integrity
availability
Feedback
Correct. Since Alfonso is having trouble accessing the Internet to get work
done, the availability of his computer Internet connectivity has been
compromised.
Question 6
Points: 10 out of 10
The computer crashed just as Tatiana was accessing her e-mail. The computer
was scrapped because it couldnt be fixed. The availability of Tatianas e-mail
is compromised.
true
false
Feedback
Correct. Tatianas e-mail is unavailable only from that computer. She can still
access it from a different computer.
Question 7
Points: 10 out of 10
Making data secure means keeping it secret.
True
False
Feedback
Correct. This statement is false because security means data is available to
those who need access to it but not available to those who do not. It does not
mean the data is completely secret.
Question 8
Points: 10 out of 10
Which type of malware is most likely to pose as a security program offering to
remove a virus from your computer if you sign up and pay right away?
A Trojan horse
Spyware
A worm
Spam
Feedback
Correct. A Trojan horse is a program that poses as a legitimate program while
actually being malware. So it might be posing as a security program.
Question 9
Points: 10 out of 10
Which of the following is most likely to be spread by a USB drive?
A virus
A worm
A Trojan horse
Spam
Feedback
Correct. Viruses need to be transferred by other programs or files in order to
infect your computer. This can be done effectively by a USB drive that can be
inserted into various computers.
Question 10
Points: 10 out of 10
It is best to use the option of storing your password when youre given the
option. It will save you time the next time you log on because you wont need
to enter your password.
true
false
Feedback
Correct. Using the store password option makes you susceptible to account
compromise. This is especially true if your user ID and password are stored
together.
Question 11
Points: 10 out of 10
Everyone needs an antivirus program, but only corporate networks need to
use firewalls.
True
False
Feedback
Correct. While antivirus software scans your computer and files, firewall
software monitors, blocks and filters activity between your computer and the
Internet. You need both.
Question 12
Points: 10 out of 10
Your computer shuts down every time you try to access the Internet with your
browser. Which of the following is the most likely cause?
Your identity has been stolen.
Your browser needs to be reinstalled.
Your computer has been compromised.
Your Internet connection is faulty.
Feedback
Correct. This is a classic sign of computer compromise.