Home Top Ad

Security

1. _____ allows an attacker to get data without ever having to directly use your computer.

A. Accidental data loss

B. Information warfare

C. File transfer

D. Information theft



2. How can real time conferencing services be a threat to intruders.?

A. There are no real threats.

B. The conferencing service can be intercepted.

C. Intruders can pretend to be a member of the conference.

D. Accidental data loss can happen.



3. An organization suspects some of its employees of leaking confidential information to its competitor is best describe as ______?

A. Dumpster diving

B. Unauthorized disclosure

C. Information warfare

D. Disinformation



4. Which of the following is not a reason why we need security for our network?

A. Affordability

B. Confidentiality

C. Integrity

D. Availability



5. Classify a network security model based on the statement below.

i. Easy to implement

ii. LAN is not connected to Internet or WAN

iii. More access from user, but less secure of network

A. Closed Security Model

B. Restrictive Securiry Model

C. Open Security Model

D. Intranet Security Model
Security Security Reviewed by FJ on 1:33 AM Rating: 5

No comments