0% found this document useful (0 votes)
53 views4 pages

Security Sheet1

The document is an examination sheet for a course on Information Security at Helwan University, focusing on various aspects of computer security. It includes multiple-choice questions about key concepts such as confidentiality, integrity, availability, and types of security attacks, as well as short answer questions requiring definitions and comparisons of security-related terms. The exam aims to assess students' understanding of security mechanisms, services, and the impact of malicious programs.

Uploaded by

mariammagdy489
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views4 pages

Security Sheet1

The document is an examination sheet for a course on Information Security at Helwan University, focusing on various aspects of computer security. It includes multiple-choice questions about key concepts such as confidentiality, integrity, availability, and types of security attacks, as well as short answer questions requiring definitions and comparisons of security-related terms. The exam aims to assess students' understanding of security mechanisms, services, and the impact of malicious programs.

Uploaded by

mariammagdy489
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Helwan University Second Term, Academic Year 2024/2025

Faculty of since Com4212 - F. of Information Security


Math. Department Sheet1

St. Name:
Major:
Index :

First: Circle the correct answer (1 mark)


1. The protection afforded to an automated information system in order to attain the
applicable objectives of preserving the integrity, availability, and __________ of
information system resources.
A. Confidentiality B. Conformity C. Infirmity D.All

2. The protection afforded to an automated information system in order to attain the


applicable objectives of preserving the_________________, availability, and
confidentiality of information system resources.
A. Conformity B. Integrity C. Infirmity D.None

3. The protection afforded to an automated information system in order to attain the


applicable objectives of preserving the integrity,______, and confidentiality of
information system resources.
A. Availability B. Liability C. Maintainability D.All

4. In NIST definition on Computer security, the keywords are _______


A. Confidentiality B. Integrity C. Availability D.All

5. _________ assures that systems work promptly and service is not denied to
authorized users.
A. Confidentiality B. Integrity C.Availability D.None

1
6. Among which is additional concepts for CIA traid ________
A. Authenticity B. Accountability C. Both A & B D.None

7. ____________ is the property of being genuine and being able to be verified and
trusted.
A. Authenticity B. Accountability C. Both A & B D.None

8. The more critical a component or service, the higher is the level of ________
required.
A. Confidentiality B. Integrity C. Availability D.None

9. The __________ security architecture is useful to managers as a way of organizing


the task of providing security.
A. OSI B. ISO C. Both A & B D.None

10. The OSI security architecture focuses on ______________


A. Security Attacks B. Mechanisms C. Services D. All

11. Highly detailed and personalized descriptions of individuals are electronic:


a. cookies c. profiles
b. histories d. web bugs

12. The information that people voluntarily post in social networking sites, blogs, and
photo- and video-sharing sites is used to create their:
a. access approval c. online identity
b. firewall d. phish

13. Computer criminals who create and distribute malicious programs.


a. antispies c. cyber traders
b. crackers d. identity thieves

2
14. Programs that come into a computer system disguised as something else are called:
a. Trojan horses c. web bugs
b. viruses d. zombies

15. Special hardware and software used to control access to a corporation’s private network
is known as a(n):
a. antivirus program c. firewall
b. communication gate d. spyware removal program

16. Small data files deposited on your hard disk from websites you have visited.
a. cookies c. cyber traders
b. crackers d. identity thieves

17. Wide range of programs that secretly record and report an individual’s activities on the
Internet.
a. Trojan horses c. web bugs
b. viruses d. spyware

18. Malicious programs that damage or disrupt a computer system.


a. maleware c. web bugs
b. viruses d. spyware

19. Infected computers that can be remotely controlled.


a. Trojan horses c. web bugs b. viruses d. zombies

20. Used by scammers to trick Internet users with official-looking websites.

a. cookies b. phishing c. plagiarism d. identity thieves

21. Process of coding information to make it unreadable except to those who have a key.

a. accuracy b. biometric c. cookies d. encryption


3
Second: Answer the following.(2 Marks)
1. What is Security attack, Security mechanism and Security service?
2. Define confidentiality.
3. Define integrity.
4. Define Authentication, Nonrepudiation, Availability and Access control.
5. List 4 general categories of attack.
6. Differentiate between Interruption and Interception.
7. Differentiate between Modification and Fabrication.
8. Compare active and passive attack
9. Define security. Define computer crime and the impact of malicious
programs, including viruses, worms, Trojan horses, and zombies, as well as
denial of service attacks, rogue Wi-Fi hotspots, data manipulation, identity
theft, Internet scams, and cyberbullying.
10. Discuss ways to protect computer security including restricting access,
encrypting data, anticipating disasters, and preventing data loss.

You might also like