Security
1. _____ allows an attacker to get data without ever having to directly use your computer.
A. Accidental data loss
B. Information warfare
C. File transfer
D. Information theft
2. How can real time conferencing services be a threat to intruders.?
A. There are no real threats.
B. The conferencing service can be intercepted.
C. Intruders can pretend to be a member of the conference.
D. Accidental data loss can happen.
3. An organization suspects some of its employees of leaking confidential information to its competitor is best describe as ______?
A. Dumpster diving
B. Unauthorized disclosure
C. Information warfare
D. Disinformation
4. Which of the following is not a reason why we need security for our network?
A. Affordability
B. Confidentiality
C. Integrity
D. Availability
5. Classify a network security model based on the statement below.
i. Easy to implement
ii. LAN is not connected to Internet or WAN
iii. More access from user, but less secure of network
A. Closed Security Model
B. Restrictive Securiry Model
C. Open Security Model
D. Intranet Security Model
A. Accidental data loss
B. Information warfare
C. File transfer
D. Information theft
2. How can real time conferencing services be a threat to intruders.?
A. There are no real threats.
B. The conferencing service can be intercepted.
C. Intruders can pretend to be a member of the conference.
D. Accidental data loss can happen.
3. An organization suspects some of its employees of leaking confidential information to its competitor is best describe as ______?
A. Dumpster diving
B. Unauthorized disclosure
C. Information warfare
D. Disinformation
4. Which of the following is not a reason why we need security for our network?
A. Affordability
B. Confidentiality
C. Integrity
D. Availability
5. Classify a network security model based on the statement below.
i. Easy to implement
ii. LAN is not connected to Internet or WAN
iii. More access from user, but less secure of network
A. Closed Security Model
B. Restrictive Securiry Model
C. Open Security Model
D. Intranet Security Model
Security
Reviewed by FJ
on
1:33 AM
Rating:




No comments