You are on page 1of 5

DNS Week 1 Quiz

Score: 100%
10/10 points

Page 1/1
1. Which of the following security objective prevents the
disclosure of sensitive information from unauthorised
people, resources, and processes?

Availability

Non-repudiation

Integrity

Confidentiality

Accounting

1/1 point

2. McCumber cube is a model framework for establishing


and evaluating information security (information
assurance) programs. It represents security goals,
information states and security safeguards by three-
dimensional cube, as shown in the following figure.
Data at rest (DAR) in an information system, such as
that stored disk can be prevented against intentional or
accidental modification through security counter
measures such as hash function. This property of CIA
Triad is known as:

Availability

Integrity

Confidentiality

Authentication

1/1 point

3. What does the term vulnerability mean?

a computer that contains sensitive information

a weakness that makes a target susceptible to an


attack

a method of attack to exploit a target

a known target or victim machine

a potential threat that a hacker creates

1/1 point

4. What service determines which resources a user can


access along with the operations that a user can
perform?

accounting
biometric

token

authentication

authorisation

1/1 point

5. What is another name for confidentiality of


information?

privacy

accuracy

consistency

trustworthiness

1/1 point

6. Which statement describes cyberwarfare?

Cyberwarfare is an attack carried out by a group of


script kiddies

It is simulation software for Air Force pilots that


allows them to practice under a simulated
war scenario

It is a series of personal protective equipment


developed for soldiers involved in nuclear war
It is Internet-based conflict that involves the
penetration of information systems of other
nations

1/1 point

7. A user is surfing the Internet using a laptop from a


public WiFi cafe. What should be checked first when the
user connects to the public network?

if the laptop Bluetooth adapter is disabled

if the laptop requires user authentication for file and


media sharing

if the laptop has a master password set to secure


the passwords stored in the password
manager

if the laptop web browser is operating in private


mode

1/1 point

8. What is cybersecurity?

the use of satellites to spy on malicious users

efforts to prevent people from becoming hackers

the act of securing the Internet

the protection of cyberspace

1/1 point
9. What was used as a cyberwarfare weapon to attack a
uranium enrichment facility in Iran?

DDoS

PSYOPS

Stuxnet

SQL injection

1/1 point

10. To which security goal a password be assigned?

Accounting

Integrity

Authentication

Authorisation

Availability

1/1 point

Done

All set! Now create your own interactive quiz. Get started

You might also like