Vous êtes sur la page 1sur 8

IIM6113InformationSecurityManagement

Youcanpreviewthisquiz,butifthiswerearealattempt,
youwouldbeblockedbecause:
Thisquizisnotcurrentlyavailable

Question1 WhichofthefollowingisNOTtheproperwaytohandlespamemails?
Notyet
answered

Markedoutof Selectone:
1.00
a.Ignorespamemails
Flag
question
b.Donotforwardspamemails

Editquestion c.Considercontrollingspamemailsbyusingemailfilteringsoftware

d.Replyandaskthesendertostopspamming

Question2 ThecontentsofaneCertmustinclude:
Notyet
answered Selectone:
Markedoutof a.Theholder'sname,emailaddressandpublickey
1.00
b.Theholder'sname,Internetserviceproviderandaccountnumber
Flag
question c.Theholder'sname,sex,nationalityandinterests
Editquestion
d.Theholder'sname,address,educationalqualificationandworkingexperience

Question3 WhichofthefollowingisNOToneofsecuritybestpracticesforpostinginformationontoblogs?
Notyet
answered Selectone:
Markedoutof a.Protectyourcontentbyestablishinganauthorisationaccesslist.
1.00
b.Checkifthetext,videoorpictureyouusedintheblogisexplicitlyapprovedbytheintellectualproperty
Flag
owner.
question

Editquestion c.Donotreleasearticlescontaininganyillegaldownloadlinks.

d.Turnonthefeaturetoallowotherstopostmessagesontotheblog.

Question4 WhichofthefollowingisNOTathreatresultingfromusingweakpasswordforyourPCandemailaccountand
Notyet seldomchangingit?
answered
Selectone:
Markedoutof
1.00 a.Theftandfraud
Flag b.Failureofcommunicationservices
question

Editquestion
c.

Unauthoriseddialinaccess

d.Unauthoriseddataaccess

Question5 WhichofthefollowingisNOToneofthefundamentalprinciplesthathelpyoubecomealawabidingInternet
user?
Notyet Selectone:
answered
a.Donotpublish,postordisseminateobsceneorunlawfulmaterial.
Markedoutof
1.00
b.Donottransmit,uploadordownloadmaterial,informationorsoftwareinviolationof
anyapplicablelegislation.
Flag
question c.Publishanotherperson'sprivateinformationtotheInternet,withoutauthority.
Editquestion
d.Donotperformanyillegalactivity.

Question6 WhichofthefollowingisNOToneofthebestpracticesforplayingonlinegamessafely?
Notyet
answered Selectone:
Markedoutof a.Knowtheprivacystatementsandotherrelatedtermsandconditionsinjoiningonline
1.00 gamecommunity.
Flag
b.Nevergiveoutanyrealpersonalinformation.
question

Editquestion c.Installanythirdpartygamepluginfromanysources,providedthatthegameplugin
givesyouextrafun.

d.Keepthegamesoftwareuptodate.

Question7 Whatisthefunctionofafirewall?
Notyet
answered Selectone:
Markedoutof a.Protectsthecomputerincaseoffire.
1.00
b.Blockorscreenoutspam.
Flag
question c.PreventstheCPUfrombeingoverheated
Editquestion d.Helpstopreventoutsidersfromobtainingunauthorisedaccesstointernalinformation
resources.

Question8 WhichofthefollowingisNOTanappropriateaction/attitudeforsurfingwebandeshopping?
Notyet
answered Selectone:
Markedoutof a.Applyadigitalcertificateforconductingelectronictransactions.
1.00
b.Ignoretheprivacypoliciesofwebsitesbecausetheyareallthesame.
Flag
question c.Choosewellknownortrustedeshoppingsites.
Editquestion d.Keepthetransactionrecords.

Question9 WhichofthefollowingisNOTa"do"tokeepchildrensafeontheInternet?
Notyet
answered Selectone:
Markedoutof a.DopunishthemwhentheyencountersomethingontheInternetthatseemsstrangeor
1.00 makesthemfeeluncomfortable.
Flag
b.Dousefilteringsoftwaretoblockaccesstowebsiteswithadultcontents.
question

Editquestion c.Doeducatethemabouttheexistinglawsthatgoverncomputerrelatedcrimes,and
warnthemoftheheavypenalty.
d.Dotellthemnottorevealpersonalinformationtootherpeople,e.g.fullnames,contact

numbers,homeaddresses,creditcardnumbers,etc.

Question10 Foremailattachmentfiles,withwhichofthefollowingextensiondowehavetopayspecialattention?
Notyet
answered Selectone:
Markedoutof a..exe,.com
1.00
b..wav,.wmp
Flag
c..txt,.rtf
question

Editquestion
d..bmp,.gif

Question11 Whichofthefollowingisthetransformingofdataintoanunreadableformatthatseemstobenotreadily
Notyet understandable,soastohideitfromoutsiders?
answered

Markedoutof Selectone:
1.00 a.DigitalCertificate
Flag
b.Decryption
question

Editquestion c.Encryption
d.

HTTP

Question12 WhichofthefollowingisNOTanappropriateactionwhenusingsoftware?
Notyet
answered Selectone:
Markedoutof a.Scanstoragemedia,especiallythosefromunknownsources,beforeuse.
1.00
b.
Flag
question
Applyupdatesandpatchestocomputertofixknownsecurityvulnerabilities
Editquestion

c.Downloadprogramswithoutpermissionofthecopyrightownerorlicensee.
d.Takeregularbackupsofyoursystemanddataandstorethemsecurely.

Question13 Whichofthefollowingisthemajoreffectofmailbombsontherecipient'sserver?
Notyet
answered Selectone:
Markedoutof a.Filluptherecipient'sdiskspaceontheserver.
1.00
b.Causedamagetotheemailfilteringsoftwareontherecipient'sserver.
Flag
question c.Filluptherecipient'sdiskspaceontheserver.Causedamagetothedataonthe
Editquestion recipient'sserver.
d.Infecttherecipient'sserverwithviruses.

Question14 WhichofthefollowingisNOTthemajoraspectofprotectinginformation?
Notyet
answered Selectone:
Markedoutof a.Confidentiality.
1.00
b.Integrity.
Flag
question c.Availability
Editquestion d.Convenience.

Question15 WhichofthefollowingisNOTthelimitationofIntrusionDetectionSystem?
Notyet
answered Selectone:
Markedoutof a.
1.00 Itcannottellyouexactlyhowtheattackoccurred.
Flag
question
Editquestion
b.Itcannottellyoutheoriginoftheattack.
c.
Itcannothelpyoutosolveorfixtheproblem.

d.
Itcannottellyouexactlytheintentionoftheattacker.

Question16 WhenemployingPublicKeyInfrastructure(PKI)services,whichofthefollowingyouwouldusetoverifyan
Notyet emailwithadigitalsignature?
answered
Selectone:
Markedoutof
1.00 a.
Flag Thesender'spublickey.
question

Editquestion
b.
Thesender'sprivatekey.

c.Yourprivatekey
d.Yourpublickey

Question17 TowhichphaseoftheInformationSecurityManagementCycledoesInformationSecurityIncidentHandling
Notyet belong?
answered
Selectone:
Markedoutof
1.00 a.Reviewing&Improving
Flag b.
question

Editquestion
AssessingSecurityRisks

c.Monitoring&Recording
d.Implementing&MaintainingaSecureFramework

Question18 WhichofthefollowingisNOToneofthemajorcomponentsofPublicKeyInfrastructure(PKI)?
Notyet
answered Selectone:
Markedoutof a.Internetserviceproviderandwirelessfixednetworktechnology
1.00
b.Digitalcertificate
Flag
question c.Cercateauthority
Editquestion d.Publickeycryptography

Question19 WhichofthefollowingisNOTanobjectiveofSecurityAudit?
Notyet
answered Selectone:
Markedoutof
a.Toassessthetechnicalandnontechnicalimplementationofthesecuritydesign.
1.00

Flag
b.Togoverntheactivitiesheld,during,andafterasecurityincidentoccurs.
question
c.Toprovideevidenceofcompliancewiththesecuritypolicy.
Editquestion
d.Toexamineandanalysethesafeguardsofthesystemandtheoperationalenvironment.

Question20 WebsiteswithSSL(SecureSocketLayer)canimprovethesecurityofonlinetransactions,butwhichofthe
Notyet followingisNOTafunctionprovidedbySSL?
answered
Selectone:
Markedoutof
1.00 a.
Flag Encryptsthecontentsofanonlinetransaction.
question

Editquestion
b.Verifiesthatbothsideshaveagreedtotheconditionsofthetransaction,preventing
eithersidefromdenyingofeverhavingmadesuchacommitment
c.

Verifiestheidentityoftherecipient

d.Preventspacketsning

Question21 WhenemployingPublicKeyInfrastructure(PKI)services,whichofthefollowingyouneedtoencryptyour
Notyet messagesoastoensurethatotherpeoplecannotreadit?
answered
Selectone:
Markedoutof
1.00 a.
Flag Therecipient'sprivatekey
question

Editquestion
b.Yourprivatekey
c.Therecipient'spublickey
d.
Yourpublickey

Question22 WhichofthefollowingisNOTconsideredassecuritymeasuresimplementedbyanecommercewebsite?
Notyet
answered Selectone:
Markedoutof a.Cookie
1.00
b.Lockiconinbrowser
Flag
question c.hps
Editquestion d.


SealsofApproval(e.g.TRUSTeorWebTrust)

Question23 Whichofthefollowingcanhelpinsecuringaccesspointsofawirelessnetwork?
Notyet
answered Selectone:
Markedoutof a.
1.00

Flag Disableallinsecureandunusedmanagementprotocolsonaccesspoints.
question
Editquestion
b.Changethedefaultconfigurationsettings
c.

Changeencryptionkeysregularly

d.Alloftheabove

Question24 hichphaseoftheSecurityManagementCycleinvolvesjobslike"SetupandImplementSecurityPolicy","Set
W
Notyet upandImplementManagementandAdministrativeProcesses",and"SelectandImplementTechnological
answered Measures"?

Markedoutof
Selectone:
1.00
a.Monitoring&Recording
Flag
question b.Implementing&MaintainingaSecureFramework
Editquestion
c.Reviewing&Improving
d.AssessingSecurityRisks

Question25 Ifadigitallysignedmessagehasbeenalteredduringthetransmissionprocess,youwillnoticethat:
Notyet
answered Selectone:
Markedoutof a.
1.00 Themessage'scontentsbecomeincomprehensiblesymbols
Flag
question

Editquestion b.Thealteredcontenthasturnedred
c.Themessagelecannotbeopened
d.
Youcannotverifycorrectlythedigitalsignatureusingthesender'spublickey.

Question26 WhichofthefollowingisNOTtypicallyincludedinasecuritypolicy?
Notyet
answered Selectone:
Markedoutof a.Minimummeasurestoprotectinformationresources.
1.00
b.
Flag
question
Informationresourcestobeprotected.
Editquestion

c.Rolesandresponsibilitiesofdifferentpartiesformakingthepolicyeffective.
d.Descriptionofspecifictechnologiesused.

Question27 WhichofthefollowingisNOTaninternationalrecognisedstandardforInformationSecurity?
Notyet
answered Selectone:
Markedoutof a.
1.00

Flag ITSEC
question

Editquestion
b.ISO27001
c.IEEE802.11b
d.ISO27002
Question28 Whatisanadware?
Notyet
answered Selectone:
Markedoutof a.Itisdesignedtostopvirusesandeliminateviruses.
1.00
b.Itisasoftwarethatdisplaysadvertisingbannerswhiletheprogramisrunning.
Flag
question c.Itisacomputersoftwarethatdetectsandcleansspyware.
Editquestion d.Itisatypeofvirusthatspecificallylooksforandremovesanothervirus.

Question29 WhichofthefollowingisNOToneofthegeneralconsiderationsforsecuringthewirelessnetwork?
Notyet
answered Selectone:
Markedoutof a.Turnoadhocmodenetworking.
1.00
b.
Flag
question

Editquestion

Disablewirelessconnectionwhenitisnotinuse.

c.Turnonresourcesharingprotocolsforyourwirelessinterfacecard.
d.Keepyourwirelessnetworkinterfacecarddriversuptodate.

Question30 WhichofthefollowingisNOTamajorobjectiveofSecurityIncidentHandling?
Notyet
answered Selectone:
Markedoutof a.Todiscloseinformationrelatedtoincidentstoallthestaffassoonaspossible.
1.00
b.
Flag
question
Toensureasystematicandefficientresponseandrecoverytotheaffectedsystem.
Editquestion

c.Tominimisepossibleimpactoftheincidentoninformationleakageandsystem
disruption,etc.
d.
Toensuretherequiredresourcesareinhandtodealwiththeincident.

Next

Vous aimerez peut-être aussi