Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Information Security Exam: Definitions and Answers, Exams of Information Technology

A list of definitions and answers related to information security concepts. It covers various aspects of security, including threats, vulnerabilities, attacks, and safeguards. Useful for understanding basic information security terminology and concepts.

Typology: Exams

2024/2025

Available from 03/12/2025

Tutornurse
Tutornurse 🇺🇸

3.5

(2)

3.4K documents

1 / 7

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
INFORMATION SECURITY EXAM WITH
CORRECT ACTUAL QUESTIONS AND
CORRECTLY WELL DEFINED ANSWERS
LATEST 2025 ALREADY GRADED A+
Spoofing attack - ANSWERS-A situation in which one person or program
successfully masquerades as another by falsifying data and thereby gaining
illegitimate access
Threat - ANSWERS-Anything (man made or act of nature) that has the potential to
cause harm
Trojan Horse - ANSWERS-A program designed as to seem to being or be doing one
thing, such as a legitimate software, but actually being or doing another, usually
set up a backdoor
Virus - ANSWERS-A self replicating program that spreads by inserting copies of
itself into other executable code or documents
pf3
pf4
pf5

Partial preview of the text

Download Information Security Exam: Definitions and Answers and more Exams Information Technology in PDF only on Docsity!

INFORMATION SECURITY EXAM WITH

CORRECT ACTUAL QUESTIONS AND

CORRECTLY WELL DEFINED ANSWERS

LATEST 2025 ALREADY GRADED A+

Spoofing attack - ANSWERS-A situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access

Threat - ANSWERS-Anything (man made or act of nature) that has the potential to cause harm

Trojan Horse - ANSWERS-A program designed as to seem to being or be doing one thing, such as a legitimate software, but actually being or doing another, usually set up a backdoor

Virus - ANSWERS-A self replicating program that spreads by inserting copies of itself into other executable code or documents

Vulnerability - ANSWERS-A weakness that could be used to endanger or cause harm to an informational asset

The process of confirming the truth of an attribute of a datum or entity - ANSWERS-Authentication

The process of verifying that a particular identity are permitted to do in a system - ANSWERS-Authorization

The information must be available to authorized entity - ANSWERS-Availability

Sending of unsolicited messages over Bluetooth to Bluetooth enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name Iield (i.e. for bluedating or bluechat) to another bluetooth enabled device via the OBEX protocol. - ANSWERS-Bluejacking

Computer Forensics and Investigation is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums. Computer forensics is also known as digital forensics. The goal of computer forensics is to explain the current state of a digital artifact - ANSWERS-Computer Forensics

Individuals must be identifiable and must be held responsible for their actions by tracking their activities - ANSWERS-Accountability

The process of mapping a known identity to an unknown entity so as to make it known - ANSWERS-Identification

A measure of the scale and magnitude of an incident or problem - ANSWERS- Impact

A process is to restore a normal service operation as quickly as possible and to minimize the impact on business operations - ANSWERS-Incident Management

Preventing the modification of information to unauthorized individuals or systems

  • ANSWERS-Integrity

A software program designed to record (log) every keystroke on the machine on which it runs - ANSWERS-Keyloggers

The use of multiple controls in a series - ANSWERS-Layering

Enforce someone cannot deny what he / she has done - ANSWERS-Non- repudiation

The process of simulating attacks on a network and its systems - ANSWERS- Penetration Testing

A slang term coined to describe the activity of a subculture of people who study, experiment with, or explore telecommunication systems, like equipment and systems connected to public telephone networks - ANSWERS-Phreaking

The likelihood that something bad will happen that causes harm to an informational asset (or the loss of the asset). Risk = threat + vulnerability - ANSWERS-Risk

A toolkit for hiding the fact that a computer's security has been compromised - ANSWERS-Rootkit

Anything that removes a vulnerability or protects against one or more speciIic threats - ANSWERS-Safeguards

Security Exploit - ANSWERS-A prepared application that takes advantage of a known weakness

Security Policy - ANSWERS-A deIinition of what it means to be secure for a system, organization or other entity which is high level definiton of secure behaviour

Security Procedures - ANSWERS-A detailed, step by step how to document that describes the exact actions necessary to implement a speciIic security mechanism, control, or solution

Worm - ANSWERS-A self replicating program that does not create copies of itself on one system: it propagates through computer networks