You are on page 1of 4

It is the tangible parts of a computer system.

Hardware

It is considered as a crucial part of information systems

Information

data

It is the process of taking preventative measures to keep the network infrastructure from any
unauthorized access, misuse of important information

Network security

Any form of security incident that is not properly handled can and eventually wont turn into a
bigger problem that will lead to a damaging data breach and wont cause large amount of
expense or it will collapse the whole system

It has a vital role in an information system because it is the one that allows a company to link
their computers and its users

Network

It determines whether you are allowed to access a specific information or file. 

Access

It is a model designed to guide policies for information security within an organization.

CIA Triad Information Security

network securit
It is the network security solution by an institute to Answer  any malicious activity in
a network.

It will help the company to provide a better strategy in keeping a data secured while avoiding
intruders to alter or steal important and confidential information.

Security Trinity

Big corporations are not at risks to any form of security breach.

How many key phases are there in an incident response plan ?

6
System that plays a vital part in Network security since it is the information that an organization
is trying to protect and avoid from any unauthorized access

Information

Availability refers to the ability of a network to protect its information from any unauthorized
access.

System that are intended to manage the computer itself such as the operating system.

Application Software

software

Areas of Security Trinity where they need to have a good security measures to avoid hackers
from getting access to the network.

Prevention

Which of these are not part of the reason why we need to secure our network?

To exploit vulnerabilities in the system

It is a structured procedure for taking care of any security incidents, breaches, and network
threats.

Detection

preventive

Internet is an example of a network.

An information that is only accessed by an authorized person.

Confidentiality

It ensures that the information in an information system is accurate.

Integrity

It is an act that exploits a vulnerability.

Attack

It has been developed by ISO in the year 1984.

OSI Reference Model


Worms can be classified as a type of computer virus that needs a third party or a user to
replicate and spread through the system.
F
Brute force attack are often successful because most of the users uses different ordinary words
as their passwords.
F
What are the signs and symptoms that your device/s are getting infected by any malware.
(Choose all that applies)

Increased CPU usage

These layers work together to transmit the data from one person to another world wide.

OSI Layer

A type of malware that automatically sends advertisements to the users.

Adware

This layer is also called human-computer interaction layer.

Application Layer

It provides data routing paths where data will take for network communication.

Network Layer

It pretends to be a legitimate programs in order to gain access to a system.

Trojan horse

It may contain phishing scams and malware.

Virus

Which of the following are not part of OSI Layer?

Transfer Layer

It is a set of standards that are widely used as a basis for communication.

Protocol

any program design to damage specific file or computer system.

Malware

These are what make networks prone to information loss and downtime

Vulnerabilities
Two different devices can communicate with each other regard

It is anything that can disrupt the operation, functioning, integrity, or availability of a network or
system

Threat

Type of malware that may contain an attachment to an email that loads malware onto your
computer system.

Phishing

This layer involves devices such as router, UTP Cables and other networking devices to transfer
data.

Physical Layer

SQL stands for?

Structured Query Language

You might also like