0% found this document useful (0 votes)
40 views5 pages

Trắc nghiệm - ATTT

The document consists of multiple-choice questions covering various topics in information security, including the goals of security, types of attacks, sensitive personal information, risk management, authentication, intrusion detection systems, and cryptographic applications. Key concepts such as confidentiality, integrity, availability, and data minimization are explored. The document serves as a study guide or assessment tool for understanding fundamental security principles and practices.

Uploaded by

chunychina28
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views5 pages

Trắc nghiệm - ATTT

The document consists of multiple-choice questions covering various topics in information security, including the goals of security, types of attacks, sensitive personal information, risk management, authentication, intrusion detection systems, and cryptographic applications. Key concepts such as confidentiality, integrity, availability, and data minimization are explored. The document serves as a study guide or assessment tool for understanding fundamental security principles and practices.

Uploaded by

chunychina28
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Trắc nghiệm biết học bài cơ à

I. Chapter 1
4. What is the primary goal of security in the context of information systems?

a. Enhancing system speed


b. Maximizing resource utilization
c. Ensuring confidentiality, integrity, Non-repudiation and availability
d. Minimizing software complexity
5. What does the term "confidentiality" mean in the context of security?
a. Ensuring data is accurate and unaltered
b. Protecting data from unauthorized access
c. Maximizing system performance
d. Preventing data loss during hardware failures
6. Which of the following is an example of a security measure to ensure
"integrity"?
a. Firewalls
b. Antivirus software
c. Data encryption
d. Digital signatures
7. What is the main focus of "availability" in information security?
a. Protecting data from being altered
b. Ensuring data is always accessible and usable
c. Detecting and removing viruses
d. Preventing unauthorized access
8. Which of the following is a key aspect of security awareness training?
a. System speed optimization
b. Educating users about security risks and best practices
c. Hardware maintenance
d. Software development techniques

II. Chapter 2
1. What is the primary goal of a "Denial of Service" (DoS) attack?
a. Unauthorized access to sensitive data
b. Altering data without detection
c. Disrupting or degrading system availability
d. Bypassing firewalls
2. Which type of attack involves tricking individuals into divulging sensitive
information, such as passwords or credit card numbers?
a. Denial of Service (DoS)
b. Spoofing
c. Phishing
d. Man-in-the-Middle (MitM)
3. What is the purpose of a "Brute Force" attack in information security?
a. Gaining unauthorized access by exploiting system vulnerabilities
b. Decrypting encrypted data through trial and error
c. Disrupting network communication
d. Infecting systems with malicious software
4. Which of the following is a characteristic of a "Zero-Day" exploit?
a. It targets previously unknown vulnerabilities
b. It relies on social engineering techniques
c. It only affects outdated software
d. It requires physical access to the target system
5. What is the main goal of a "Man-in-the-Middle" (MitM) attack?
a. Disrupting network communication
b. Intercepting and possibly altering communication between two parties
c. Crashing a system by overwhelming it with traffic
d. Exploiting software vulnerabilities to gain unauthorized access

III. Chapter 3
1. Which of the following is considered sensitive personal information?
a. Name and address
b. Eye color
c. Favorite hobby
d. Pet's name

2. What is the primary concern related to the unauthorized disclosure of


personal information?
a. Identity theft and fraud
b. Enhancing social interactions
c. Improving customer service
d. Building a personal brand
3. What is the principle of "data minimization" in the context of personal
information?
a. Collecting as much data as possible
b. Storing data indefinitely
c. Only collecting and processing the data necessary for a specific purpose
d. Sharing personal information without consent

IV. Chapter 5
1. What is the first step in the risk management process?
=> Risk identification
2. What does the term “risk mitigation” involve in risk management?
=> Reducing the impact or likelihood of a risk

V. Chapter 6
1. What is the primary purpose of authentication in information security?
=> Verifying the identity of users or systems
2. Which of the following is an example of a “knowledge-based” authentication factor?
=> Username (something you know)
3. What is the main disadvantage of using only a password for authentication?
=> It can be easily guessed or cracked

VI. Chapter 7
4. What is the primary purpose of an Intrusion Detection and Prevention
System (IDPS)?
a. Encrypting sensitive data
b. Detecting and responding to security threats
c. Managing network bandwidth
d. Providing secure user authentication
5. Which type of IDPS focuses on identifying patterns of suspicious behavior
on a network?
a. Network-based IDPS
b. Host-based IDPS
c. Signature-based IDPS
d. Anomaly-based IDPS

6. What is the purpose of signature-based detection in an IDPS?


a. Identifying deviations from normal behavior
b. Analyzing network traffic patterns
c. Recognizing known attack patterns
d. Monitoring system logs

VII. Chapter 8

10. What is the primary characteristic of a transposition cipher?

a. Substituting each letter with another letter

b. Rearranging the order of characters in the message

c. Mixing the plaintext with a secret key

d. Applying mathematical operations to each character

11. What does WPA stand for in the context of mobile technology?

a. Wireless Access Point

b. Web Application Programming

c. Wireless Application Protocol

d. Wi-Fi Protected Access


12. What is the main purpose of steganography in information security?

a. Encrypting data for secure transmission

b. Hiding information within other data to avoid detection

c. Authenticating users through biometric methods

d. Protecting against malware attacks

13. What is the primary function of a digital signature in cryptographic


applications?

a. Encrypting data for secure transmission

b. Providing a unique identifier for digital files

c. Verifying the origin and integrity of a message or document

d. Authenticating users through passwords

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy