Quiz 02

Created
    English
  1. Computers
  2. University
  3. AvatarEnrico Lucero
Best for asynchronous learning and homeworkAssign in student-paced mode
Best for live in-class or video conferencing lessonsStart teacher-led lesson
Preview as student

**Important: Don't share this link with your classmates, or else you will be automatically graded with 5.0.

**Direction: Choose the correct answer and submit your response within the allotted time.

QUIZ 02:

FUNDAMENTALS OF INFORMATION ASSURANCE AND SECURITY

2. Which security measure helps track user activity on a computer system?

A) Sharing passwords

B) Using individual passwords for users

C) Storing passwords on a central server

D) Disabling user accounts

A) Individual user passwords

B) Automatic logouts

C) Regular software updates

D) Public access

1. What is a primary method to protect computer systems from unauthorized access?

3. What is an essential characteristic of a strong password?

A) It contains only letters.

B) It is easy to remember.

C) It includes a mix of letters, numbers, and symbols.

D) It is less than 6 characters long.

4. What type of vulnerability is "Fallout" related to?

A) Hardware malfunctions

B) Software bugs

C) Speculative execution attacks

D) Network misconfigurations

5. Which of the following is NOT a feature of a good password?

6. What is the role of a hypervisor?

A) Length of at least 12 characters

B) Use of common words

C) Combination of letters, numbers, and symbols

D) Avoiding predictable patterns

A) To manage user passwords

B) To run multiple virtual machines on a single physical machine

C) To encrypt sensitive files

D) To monitor antivirus software

7. Which of the following measures helps secure against viruses effectively?

A) Ignoring suspicious emails

B) Educating employees about phishing attacks

C) Only using antivirus software

D) Regular system restarts

8. How can one enhance password security?

A) Use the same password for multiple accounts

B) Incorporate predictable patterns

C) Use a password manager to create unique passwords

D) Share passwords with close friends

9. Why is encryption important for data security?

10. What is the purpose of two-factor authentication?

A) It allows anyone to access data.

B) It ensures data can only be accessed by those with a unique key

C) It slows down data access.

D) It is not necessary for local databases.

A) To simplify the login process

B) To require an additional layer of security beyond a password

C) To eliminate passwords entirely

D) To allow free access to systems

11. What is a common vulnerability found in firmware?

A) Incompatibility with devices

B) Exploitable security flaws that can be targeted

C) High power consumption

D) Lack of user interfaces

12. Which of the following should be avoided when creating a strong password?

A) Combining symbols, numbers, and letters

B) Using personal information like birthdates

C) Making it sufficiently long

D) Using a passphrase

13. What is the function of a firewall?

14. Why is it crucial to avoid reusing passwords across accounts?

A) It automates password management.

B) It monitors and controls incoming and outgoing network traffic

C) It detects viruses on a local machine.

D) It encrypts files on the disk

A) It makes management easier.

B) It can lead to weaker security if one account is compromised.

C) It allows for quicker logins.

D) It helps in remembering them.

15. Which of the following accounts for a significant risk of data exposure?

A) Using encryption

B) Storing sensitive information in the cloud without protection

C) Regularly updating security measures

D) Maintaining multiple backups

16. In terms of network security, what is an intrusion detection system?

A) A tool to create complex passwords

B) A system to monitor network traffic for suspicious activities

C) A method to encrypt data in transit

D) A software that speeds up network connections

17. What is the purpose of security updates for software?

18. Which practice is least effective in preventing unauthorized access to accounts?

A) To introduce new features

B) To fix vulnerabilities and improve security

C) To enhance user interfaces

D) To increase system requirements

A) Using multi-factor authentication

B) Setting a password based on personal information

C) Creating unique passwords for different accounts

D) Regularly changing passwords

19. What is a potential consequence of weak password policies?

A) Enhanced user convenience

B) Increased vulnerability to breaches

C) Improved employee morale

D) Streamlined account recovery processes

20. What should you do if you suspect that your password has been compromised?

A) Wait for the annual password change

B) Change it immediately and notify relevant parties

C) Ignore it if nothing seems wrong

D) Share it with trusted individuals

A) To make them responsible for network maintenance

B) To empower them to identify and avoid potential threats

C) To minimize the need for technical support

D) To prevent them from using personal devices

21. Why is it important to educate employees about cybersecurity threats?

22. What is the primary function of an antivirus program?

A) To encrypt sensitive data

B) To detect and eliminate malicious software

C) To monitor password strength

D) To provide internet access

23. What is a significant risk of poorly configured network systems?

A) Improved data transfer speeds

B) Greater accessibility for users

C) Increased potential for unauthorized access

D) Simplified system management

24. In cybersecurity, what does MDS stand for?

A) Multi-Dimensional Security

B) Microarchitecture Data Sampling

C) Maximum Data Storage

D) Modular Defense Strategy

25. Which of the following is an effective way to handle sensitive information?

26. What is a common consequence of using outdated software?

A) Writing it down on a sticky note

B) Using end-to-end encryption

C) Sharing it via email without protection

D) Storing it in an unsecured document

A) Increased compatibility with hardware

B) Vulnerability to exploitation through known issues

C) Enhanced speed performance

D) Lower maintenance requirements

27. Why is it advisable to use password managers?

A) They store only one password.

B) They help generate and manage strong, unique passwords.

C) They require the same password for all accounts.

D) They simplify the process of password sharing.

28. What should you do to keep your file systems secure?

A) Regularly remove old files

B) Use encryption for sensitive files

C) Grant access to everyone

D) Disable security features for ease of use

29. What is a best practice for email security?

30. When managing access controls, what is the principle of least privilege?

A) Ignoring email attachments

B) Opening emails from unknown senders immediately

C) Being cautious and verifying the sender before opening attachments

D) Using public Wi-Fi without VPN

A) Users are given full access to all resources.

B) Users have only the access necessary to perform their job functions.

C) Access should be shared among users.

D) All users should have equal access.

31. To protect sensitive data from ___________________, organizations often implement encryption techniques.

32. A _________________ is a malicious software designed to gain unauthorized access to a computer system.

33. The process of verifying a user’s identity through two or more verification methods is known as __________________________.

34. Phishing attacks are often disguised as legitimate communication to trick users into providing ______________ information.

35. One common way to safeguard against ________________ access is to use strong, unique passwords for each account.

36. After a data breach, it’s crucial for a company to perform a __________________ to assess what vulnerabilities were exploited.

37. A firewall acts as a ________________ barrier to prevent unauthorized access to or from a private network.

38. ______________________ is a form of cyberattack that overwhelms a system by flooding it with traffic, making it unavailable to users.

39. Security policies should be regularly reviewed and updated to address new __________ in the digital landscape.

40. It is important to educate employees about _______________ techniques, such as recognizing suspicious emails or links.

41. When evaluating the effectiveness of cybersecurity measures, organizations should consider ______________, which helps them learn from past incidents.

42. A _________________________ attack focuses on compromising a target’s social networks to gain sensitive information.

43. The principle of least privilege ensures that users have the minimum level of __________ necessary to perform their tasks.

44. Organizations often perform ________________ assessments to identify potential security weaknesses in their systems.

45. Regular software updates help to protect against ____________ vulnerabilities that could be exploited by attackers.