You are on page 1of 3

.

Which Security layer is used to protect items such as laptops, servers, and Pcs which involves the use of
guards, lockable rooms and CCTV cameras is known as?

*a. Physical

b. Personal

c. Object

d. Standard

8. An information is the quality or state of being genuine or original is known as?

*a. Authenticity

b. Spoofing

c. Confidence

d. Authorization

11. An object, person, or other entity that represents a constant danger to an asset

*a. Threat

b. Vulnerability

c. Exploit

d. Information Security

1. a/(an) _____ is existence of a weakness that can lead to undesirable event compromising
the system.
*a. Vulnerability
b. exploit
c. threat
d. subject
2. An individual who removes an application’s software protection that is designed to
prevent unauthorized duplication and time limit.
a. Phreaker
*b. Cracker
c. spoofing
d. Sniffer

3. A computer ______ is a malware that replicates itself in order to spread to other


computers. Often, it uses a computer network to spread itself.
a. virus
*b. worm
c. trojan
d. spam
4. A hacker can use a _______ software to monitor and capture all data travels on the
network such as login IDs and unencrypted passwords.
a. spoofing
*b. sniffing
c. man-in -the middle
d. pharming
5. Reema received an email from her bank account manager and the email asked her to
login to the system using the provided link and update her information such as phone and
address. The next day Remma found that an amount of 5000 AED withdrawn from her
bank account. What is this type of attack?
a. deception
b. Pharming
*c. Phishing
d. Spoofing

Type: E

6. A successful organization should have multiple layers of security in place. List Six layers of
security that should be implemented to secure the information system. (3 Marks)

a. Physical security
b. Personal security
c. Operations security
d. Communications security
e. Network security
f. Information security
7. List three main criterion to identify asset with 1-1 example. (3 Marks)

People:
a. Name, position, ID, supervisor, security clearance, etc.
Procedures:
b. Description, purpose, storage location, etc.
Data:
c. Classification, own/creator/manager, size, structure, location, backup, etc.

Which of the following is an example of physical security controls?


*Gates
Antivirus
Antispam
Firewall

____ plans usually include all preparations for the recovery process, strategies to limit losses
during the disaster, and detailed steps to follow when the smoke clears, the dust settles, or the
􀃒oodwaters recede.
Incident Response
*Disaster Recovery
Business Continuity
Business Response

You might also like