You are on page 1of 2

Directions: Write the letter of the correct answer on the space provided before each

item.
____A_____ 1. What do you call the unsolicited messenger you found on your
Facebook messenger?
a.Spam b. Spim
c.Junk d.Archive
____C_____ 2. The following are the ways to prevent malware EXCEPT for
what?
a.Conduct educating sessions
b.Utilize pwerful username and passwords
c.Sell them your downloaded anti-malware programs
d.Scan your drives regularly and put malicious files on quarantine
_____C____ 3. It is a type of malware that masquerades as an essential
application,
a.Trojan Horse b.Worm
c.Virus d.Rootkit
_____A____ 4. It refers to a suggested activity that may help to assure the
safety of your assets.
a.Countermeasure b.Scanning
c.Quarantine d.Anti-malware
_____A____ 5. We can say that a file is malicious if it _________,
a.Causes damage b.Escalates security privileges
c.Divulges private data d.Back-ups important files
_____C____ 6. It refers to the data that one needs to enable to maximize web-
browsing capability.
a.Hoax b.Worm c.Cookies d.Incognito
_____C____ 7. This refers to a threat when someone exploits the confidential
information into organization or people for intention of attacking the asset’s owner.
a.Death Threat b.Disclosure Threat
c.Unauthorized Threat d.Hijacking
____D_____ 8. The following are “Security Breaches”EXCEPTfor what?
a.Denial of Service Attack(DoS) b.Distributed denial-of-service (DDoS)
c.Wiretapping d.Computer Formatting
____A_____ 9. The following are the stuff that Information Security is trying
to protect EXCEPTfor what?
a. Attitudes b.Bank Accounts
c. Registration Details d. LAN and WAN Networks
_____B____ 10. Assets, such as Crown Jewels
should be kept in________.
a.Treasure Box b.Vault
c.Secured database d. Fault-free bodega

POST-TEST. Quiz 2.2


Directions: Tell whether the following is an asset, threat, risk, vulnerability, or
countermeasure.
______Countermessure______ 1. The manager told a client the account balance
of his/her rival.
_____ Countermessure _____ 2. The student wrote his home address on the
registration form.
_______Risk_________3. The Network Engineer left the server room open while
he/she went for a snack.
____ Countermessure _____ 4. The anti-malware software runs scan every
three hours.
_______Threat_________5. The hacker of your rival company found out that your
login credential is your birthday.
________Threat________6. You found out that your computer is infected and you
run the back-up quickly.
________Asset________7. You answered 150,00.00 on the survey of your family’s
annual income. ________________8. The IT Team advises their online bankers not
to share their One-Time Passwords (OTP)
________Vulnerability________9. Your anti-malware application expired and you
did not purchase a good one to secure your files.
________Risk________10. The manager forgot to lock his/her computer because of
the tension happened in the office.

You might also like