Professional Documents
Culture Documents
item.
____A_____ 1. What do you call the unsolicited messenger you found on your
Facebook messenger?
a.Spam b. Spim
c.Junk d.Archive
____C_____ 2. The following are the ways to prevent malware EXCEPT for
what?
a.Conduct educating sessions
b.Utilize pwerful username and passwords
c.Sell them your downloaded anti-malware programs
d.Scan your drives regularly and put malicious files on quarantine
_____C____ 3. It is a type of malware that masquerades as an essential
application,
a.Trojan Horse b.Worm
c.Virus d.Rootkit
_____A____ 4. It refers to a suggested activity that may help to assure the
safety of your assets.
a.Countermeasure b.Scanning
c.Quarantine d.Anti-malware
_____A____ 5. We can say that a file is malicious if it _________,
a.Causes damage b.Escalates security privileges
c.Divulges private data d.Back-ups important files
_____C____ 6. It refers to the data that one needs to enable to maximize web-
browsing capability.
a.Hoax b.Worm c.Cookies d.Incognito
_____C____ 7. This refers to a threat when someone exploits the confidential
information into organization or people for intention of attacking the asset’s owner.
a.Death Threat b.Disclosure Threat
c.Unauthorized Threat d.Hijacking
____D_____ 8. The following are “Security Breaches”EXCEPTfor what?
a.Denial of Service Attack(DoS) b.Distributed denial-of-service (DDoS)
c.Wiretapping d.Computer Formatting
____A_____ 9. The following are the stuff that Information Security is trying
to protect EXCEPTfor what?
a. Attitudes b.Bank Accounts
c. Registration Details d. LAN and WAN Networks
_____B____ 10. Assets, such as Crown Jewels
should be kept in________.
a.Treasure Box b.Vault
c.Secured database d. Fault-free bodega