Question 11 What is defined as the set of protections put in
Question 11
What is defined as the set of protections put in place to safeguard information systems and/or data from security threats such as unauthorized access, use, disclosure, disruption, modification or destruction?
Information Screening
Information Security
Anti-virus
Firewall
2.5 points
Question 12
What kind of threat renders a system inoperative or limits its capability to operate?
Denial of service
Unauthorized access
Theft and fraud
Passive
2.5 points
Question 13
What term is used to refer to someone (or something) pretending to be someone else (or another computer)?
Phishing
Spoofing
Smurfing
Porting
2.5 points
Question 14
You have received an email from your university IT department stressing that the IT department will NEVER ask you for your username and password to your email account. What type of scheme is the university most likely trying to protect you from?
Phishing
Smurfing
Spoofing
Security holes
2.5 points
Question 15
When considering security threats it is very important to consider __________ and __________ of the threat on the organization.
impact, theft
prevalence, impact
repudiation, availablity
theft, prevalence
| A. | Information Screening | |
| B. | Information Security | |
| C. | Anti-virus | |
| D. | Firewall |
Solution
Question 11: B. Information Security
Question 12: A. Denial of service
Question 13: B. Spoofing
Question 14: A. Phishing

