Quiz 1 Flashcards

1
Q

Which of the following are the three critical characteristics of information, that Information Security is concerned with?

SQL Injections, Buffer overflows, Hacking attacks

Confidentiality, Integrity and Availability

Confrontation, Imposition and Access

National Security Agency, Federal Buro of Investigation, and Department of Defence

A

Confidentiality, Integrity and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which part of the OSI network model do network cables belong to?

The Network layer
The Physical layer
The Application layer
The Transport Layer

A

The Physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between a worm and a trojan horse?

Worms hide their true nature, and trojan horses are malicious code that replicates

Trojan horses cost money, and worms are free.

Trojan Horses hide their true nature, and worms are malicious code that replicates

Worms always use SQL injection, but trojan horses use buffer overflows

A

Trojan Horses hide their true nature, and worms are malicious code that replicates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which answer is correct, based on the following information?

Alice uses the company’s web content management system to look for information about her work. Bob manages the data on the web content management system. Ann is the CEO and is the defined owner of the data on the web content management system according to the organization’s Information Security Management System.

Alice is the Data custodian, Ann is the data user, and Bob is the data owner.

Bob is the Data custodian, Alice is the data user, Ann is the data owner.

Ann is the Data custodian, Bob is the data user, and Alice is the data owner.

Alice is the Data custodian, Bob is the data user, and Ann is the data owner.

A

Bob is the Data custodian, Alice is the data user, Ann is the data owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between a data owner, a custodian and a user?

The data owner is always the boss of the data user.

The data custodian is responsible for the security and use of a particular set of information, while the data owner is responsible for the storage, maintenance, and protection of information

The data owner is responsible for the security and use of a particular set of information, while the data custodian is responsible for the storage, maintenance, and protection of information

The data owner is always the SQL administrator, and the data user is always an employee.

A

The data owner is responsible for the security and use of a particular set of information, while the data custodian is responsible for the storage, maintenance, and protection of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Choose the most correct statement based on the following information:

Which of the following statements are true if we consider the risk of someone breaking into a room and we see that the pump on the door to the room is faulty and doesn’t always close?

The threat is that someone may break into the room, and the pump being broken is a vulnerability.

If the door pump is fixed, it will prevent hacking of any servers in the room.

The vulnerability is that someone may break into the room, and the pump being broken is a threat.

Fixing the door pump will eliminate the threat of someone breaking in to the room.

A

The threat is that someone may break into the room, and the pump being broken is a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Complete the following sentence:

UDP is considered a/an ______________ protocol because it is _________________.

unreliable, connectionless
reliable, stateful
TCP, IP
DNS, TCP/IP

A

unreliable, connectionless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between a MAC address and an IP address? (Hint: the first three digits of the MAC address identifies a vendor).

An IP address is on the Network layer of the OSI model, and the MAC address is on the data link layer of the OSI model.

A MAC address is on the Network layer of the OSI model, and the IP address is on the data link layer of the OSI model.

MAC addresses are used on Mac computers by Apple instead of IP addresses, and IP addresses are used on Windows and Linux systems.

A MAC address has 128 bits, and an IP address has 69 bits.

A

An IP address is on the Network layer of the OSI model, and the MAC address is on the data link layer of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is the correct order of the layers in the OSI model, in the order lowest to highest.

Confidentiality, Integrity, Availability, Transport, Network, Data link, Physical.

Physical, Data link, Network, Transport, Session, Presentation, Application

Application, Presentation, SQL Injection, Transport, Network, Data link, Physical.

Application, Presentation, Session, Transport, Network, Data link, Physical.

A

Physical, Data link, Network, Transport, Session, Presentation, Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Based on the material covered in class, which of the following ports are associated with which service?

80 HTTP, 443 HTTPS, 110 POP3

12345 Ransomware, 443 HTTP, 111 POP3

80 Telnet, 443 SSH, 110 POP9

443 HTTP, 80 HTTPS, 110 POP3

A

80 HTTP, 443 HTTPS, 110 POP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly