Académique Documents
Professionnel Documents
Culture Documents
Youcanpreviewthisquiz,butifthiswerearealattempt,
youwouldbeblockedbecause:
Thisquizisnotcurrentlyavailable
Question1 WhichofthefollowingisNOTtheproperwaytohandlespamemails?
Notyet
answered
Markedoutof Selectone:
1.00
a.Ignorespamemails
Flag
question
b.Donotforwardspamemails
Editquestion c.Considercontrollingspamemailsbyusingemailfilteringsoftware
d.Replyandaskthesendertostopspamming
Question2 ThecontentsofaneCertmustinclude:
Notyet
answered Selectone:
Markedoutof a.Theholder'sname,emailaddressandpublickey
1.00
b.Theholder'sname,Internetserviceproviderandaccountnumber
Flag
question c.Theholder'sname,sex,nationalityandinterests
Editquestion
d.Theholder'sname,address,educationalqualificationandworkingexperience
Question3 WhichofthefollowingisNOToneofsecuritybestpracticesforpostinginformationontoblogs?
Notyet
answered Selectone:
Markedoutof a.Protectyourcontentbyestablishinganauthorisationaccesslist.
1.00
b.Checkifthetext,videoorpictureyouusedintheblogisexplicitlyapprovedbytheintellectualproperty
Flag
owner.
question
Editquestion c.Donotreleasearticlescontaininganyillegaldownloadlinks.
d.Turnonthefeaturetoallowotherstopostmessagesontotheblog.
Question4 WhichofthefollowingisNOTathreatresultingfromusingweakpasswordforyourPCandemailaccountand
Notyet seldomchangingit?
answered
Selectone:
Markedoutof
1.00 a.Theftandfraud
Flag b.Failureofcommunicationservices
question
Editquestion
c.
Unauthoriseddialinaccess
d.Unauthoriseddataaccess
Question5 WhichofthefollowingisNOToneofthefundamentalprinciplesthathelpyoubecomealawabidingInternet
user?
Notyet Selectone:
answered
a.Donotpublish,postordisseminateobsceneorunlawfulmaterial.
Markedoutof
1.00
b.Donottransmit,uploadordownloadmaterial,informationorsoftwareinviolationof
anyapplicablelegislation.
Flag
question c.Publishanotherperson'sprivateinformationtotheInternet,withoutauthority.
Editquestion
d.Donotperformanyillegalactivity.
Question6 WhichofthefollowingisNOToneofthebestpracticesforplayingonlinegamessafely?
Notyet
answered Selectone:
Markedoutof a.Knowtheprivacystatementsandotherrelatedtermsandconditionsinjoiningonline
1.00 gamecommunity.
Flag
b.Nevergiveoutanyrealpersonalinformation.
question
Editquestion c.Installanythirdpartygamepluginfromanysources,providedthatthegameplugin
givesyouextrafun.
d.Keepthegamesoftwareuptodate.
Question7 Whatisthefunctionofafirewall?
Notyet
answered Selectone:
Markedoutof a.Protectsthecomputerincaseoffire.
1.00
b.Blockorscreenoutspam.
Flag
question c.PreventstheCPUfrombeingoverheated
Editquestion d.Helpstopreventoutsidersfromobtainingunauthorisedaccesstointernalinformation
resources.
Question8 WhichofthefollowingisNOTanappropriateaction/attitudeforsurfingwebandeshopping?
Notyet
answered Selectone:
Markedoutof a.Applyadigitalcertificateforconductingelectronictransactions.
1.00
b.Ignoretheprivacypoliciesofwebsitesbecausetheyareallthesame.
Flag
question c.Choosewellknownortrustedeshoppingsites.
Editquestion d.Keepthetransactionrecords.
Question9 WhichofthefollowingisNOTa"do"tokeepchildrensafeontheInternet?
Notyet
answered Selectone:
Markedoutof a.DopunishthemwhentheyencountersomethingontheInternetthatseemsstrangeor
1.00 makesthemfeeluncomfortable.
Flag
b.Dousefilteringsoftwaretoblockaccesstowebsiteswithadultcontents.
question
Editquestion c.Doeducatethemabouttheexistinglawsthatgoverncomputerrelatedcrimes,and
warnthemoftheheavypenalty.
d.Dotellthemnottorevealpersonalinformationtootherpeople,e.g.fullnames,contact
numbers,homeaddresses,creditcardnumbers,etc.
Question10 Foremailattachmentfiles,withwhichofthefollowingextensiondowehavetopayspecialattention?
Notyet
answered Selectone:
Markedoutof a..exe,.com
1.00
b..wav,.wmp
Flag
c..txt,.rtf
question
Editquestion
d..bmp,.gif
Question11 Whichofthefollowingisthetransformingofdataintoanunreadableformatthatseemstobenotreadily
Notyet understandable,soastohideitfromoutsiders?
answered
Markedoutof Selectone:
1.00 a.DigitalCertificate
Flag
b.Decryption
question
Editquestion c.Encryption
d.
HTTP
Question12 WhichofthefollowingisNOTanappropriateactionwhenusingsoftware?
Notyet
answered Selectone:
Markedoutof a.Scanstoragemedia,especiallythosefromunknownsources,beforeuse.
1.00
b.
Flag
question
Applyupdatesandpatchestocomputertofixknownsecurityvulnerabilities
Editquestion
c.Downloadprogramswithoutpermissionofthecopyrightownerorlicensee.
d.Takeregularbackupsofyoursystemanddataandstorethemsecurely.
Question13 Whichofthefollowingisthemajoreffectofmailbombsontherecipient'sserver?
Notyet
answered Selectone:
Markedoutof a.Filluptherecipient'sdiskspaceontheserver.
1.00
b.Causedamagetotheemailfilteringsoftwareontherecipient'sserver.
Flag
question c.Filluptherecipient'sdiskspaceontheserver.Causedamagetothedataonthe
Editquestion recipient'sserver.
d.Infecttherecipient'sserverwithviruses.
Question14 WhichofthefollowingisNOTthemajoraspectofprotectinginformation?
Notyet
answered Selectone:
Markedoutof a.Confidentiality.
1.00
b.Integrity.
Flag
question c.Availability
Editquestion d.Convenience.
Question15 WhichofthefollowingisNOTthelimitationofIntrusionDetectionSystem?
Notyet
answered Selectone:
Markedoutof a.
1.00 Itcannottellyouexactlyhowtheattackoccurred.
Flag
question
Editquestion
b.Itcannottellyoutheoriginoftheattack.
c.
Itcannothelpyoutosolveorfixtheproblem.
d.
Itcannottellyouexactlytheintentionoftheattacker.
Question16 WhenemployingPublicKeyInfrastructure(PKI)services,whichofthefollowingyouwouldusetoverifyan
Notyet emailwithadigitalsignature?
answered
Selectone:
Markedoutof
1.00 a.
Flag Thesender'spublickey.
question
Editquestion
b.
Thesender'sprivatekey.
c.Yourprivatekey
d.Yourpublickey
Question17 TowhichphaseoftheInformationSecurityManagementCycledoesInformationSecurityIncidentHandling
Notyet belong?
answered
Selectone:
Markedoutof
1.00 a.Reviewing&Improving
Flag b.
question
Editquestion
AssessingSecurityRisks
c.Monitoring&Recording
d.Implementing&MaintainingaSecureFramework
Question18 WhichofthefollowingisNOToneofthemajorcomponentsofPublicKeyInfrastructure(PKI)?
Notyet
answered Selectone:
Markedoutof a.Internetserviceproviderandwirelessfixednetworktechnology
1.00
b.Digitalcertificate
Flag
question c.Cercateauthority
Editquestion d.Publickeycryptography
Question19 WhichofthefollowingisNOTanobjectiveofSecurityAudit?
Notyet
answered Selectone:
Markedoutof
a.Toassessthetechnicalandnontechnicalimplementationofthesecuritydesign.
1.00
Flag
b.Togoverntheactivitiesheld,during,andafterasecurityincidentoccurs.
question
c.Toprovideevidenceofcompliancewiththesecuritypolicy.
Editquestion
d.Toexamineandanalysethesafeguardsofthesystemandtheoperationalenvironment.
Question20 WebsiteswithSSL(SecureSocketLayer)canimprovethesecurityofonlinetransactions,butwhichofthe
Notyet followingisNOTafunctionprovidedbySSL?
answered
Selectone:
Markedoutof
1.00 a.
Flag Encryptsthecontentsofanonlinetransaction.
question
Editquestion
b.Verifiesthatbothsideshaveagreedtotheconditionsofthetransaction,preventing
eithersidefromdenyingofeverhavingmadesuchacommitment
c.
Verifiestheidentityoftherecipient
d.Preventspacketsning
Question21 WhenemployingPublicKeyInfrastructure(PKI)services,whichofthefollowingyouneedtoencryptyour
Notyet messagesoastoensurethatotherpeoplecannotreadit?
answered
Selectone:
Markedoutof
1.00 a.
Flag Therecipient'sprivatekey
question
Editquestion
b.Yourprivatekey
c.Therecipient'spublickey
d.
Yourpublickey
Question22 WhichofthefollowingisNOTconsideredassecuritymeasuresimplementedbyanecommercewebsite?
Notyet
answered Selectone:
Markedoutof a.Cookie
1.00
b.Lockiconinbrowser
Flag
question c.hps
Editquestion d.
SealsofApproval(e.g.TRUSTeorWebTrust)
Question23 Whichofthefollowingcanhelpinsecuringaccesspointsofawirelessnetwork?
Notyet
answered Selectone:
Markedoutof a.
1.00
Flag Disableallinsecureandunusedmanagementprotocolsonaccesspoints.
question
Editquestion
b.Changethedefaultconfigurationsettings
c.
Changeencryptionkeysregularly
d.Alloftheabove
Question24 hichphaseoftheSecurityManagementCycleinvolvesjobslike"SetupandImplementSecurityPolicy","Set
W
Notyet upandImplementManagementandAdministrativeProcesses",and"SelectandImplementTechnological
answered Measures"?
Markedoutof
Selectone:
1.00
a.Monitoring&Recording
Flag
question b.Implementing&MaintainingaSecureFramework
Editquestion
c.Reviewing&Improving
d.AssessingSecurityRisks
Question25 Ifadigitallysignedmessagehasbeenalteredduringthetransmissionprocess,youwillnoticethat:
Notyet
answered Selectone:
Markedoutof a.
1.00 Themessage'scontentsbecomeincomprehensiblesymbols
Flag
question
Editquestion b.Thealteredcontenthasturnedred
c.Themessagelecannotbeopened
d.
Youcannotverifycorrectlythedigitalsignatureusingthesender'spublickey.
Question26 WhichofthefollowingisNOTtypicallyincludedinasecuritypolicy?
Notyet
answered Selectone:
Markedoutof a.Minimummeasurestoprotectinformationresources.
1.00
b.
Flag
question
Informationresourcestobeprotected.
Editquestion
c.Rolesandresponsibilitiesofdifferentpartiesformakingthepolicyeffective.
d.Descriptionofspecifictechnologiesused.
Question27 WhichofthefollowingisNOTaninternationalrecognisedstandardforInformationSecurity?
Notyet
answered Selectone:
Markedoutof a.
1.00
Flag ITSEC
question
Editquestion
b.ISO27001
c.IEEE802.11b
d.ISO27002
Question28 Whatisanadware?
Notyet
answered Selectone:
Markedoutof a.Itisdesignedtostopvirusesandeliminateviruses.
1.00
b.Itisasoftwarethatdisplaysadvertisingbannerswhiletheprogramisrunning.
Flag
question c.Itisacomputersoftwarethatdetectsandcleansspyware.
Editquestion d.Itisatypeofvirusthatspecificallylooksforandremovesanothervirus.
Question29 WhichofthefollowingisNOToneofthegeneralconsiderationsforsecuringthewirelessnetwork?
Notyet
answered Selectone:
Markedoutof a.Turnoadhocmodenetworking.
1.00
b.
Flag
question
Editquestion
Disablewirelessconnectionwhenitisnotinuse.
c.Turnonresourcesharingprotocolsforyourwirelessinterfacecard.
d.Keepyourwirelessnetworkinterfacecarddriversuptodate.
Question30 WhichofthefollowingisNOTamajorobjectiveofSecurityIncidentHandling?
Notyet
answered Selectone:
Markedoutof a.Todiscloseinformationrelatedtoincidentstoallthestaffassoonaspossible.
1.00
b.
Flag
question
Toensureasystematicandefficientresponseandrecoverytotheaffectedsystem.
Editquestion
c.Tominimisepossibleimpactoftheincidentoninformationleakageandsystem
disruption,etc.
d.
Toensuretherequiredresourcesareinhandtodealwiththeincident.
Next