Security Sheet1
Security Sheet1
St. Name:
Major:
Index :
5. _________ assures that systems work promptly and service is not denied to
authorized users.
A. Confidentiality B. Integrity C.Availability D.None
1
6. Among which is additional concepts for CIA traid ________
A. Authenticity B. Accountability C. Both A & B D.None
7. ____________ is the property of being genuine and being able to be verified and
trusted.
A. Authenticity B. Accountability C. Both A & B D.None
8. The more critical a component or service, the higher is the level of ________
required.
A. Confidentiality B. Integrity C. Availability D.None
12. The information that people voluntarily post in social networking sites, blogs, and
photo- and video-sharing sites is used to create their:
a. access approval c. online identity
b. firewall d. phish
2
14. Programs that come into a computer system disguised as something else are called:
a. Trojan horses c. web bugs
b. viruses d. zombies
15. Special hardware and software used to control access to a corporation’s private network
is known as a(n):
a. antivirus program c. firewall
b. communication gate d. spyware removal program
16. Small data files deposited on your hard disk from websites you have visited.
a. cookies c. cyber traders
b. crackers d. identity thieves
17. Wide range of programs that secretly record and report an individual’s activities on the
Internet.
a. Trojan horses c. web bugs
b. viruses d. spyware
21. Process of coding information to make it unreadable except to those who have a key.