Quiz 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

EE4758-IM3003 Quiz 1

What is information security?


"Information security is the collection of technologies, standards, policies and
management practices that are applied to information to keep it secure."
It is just using technology to keep digital information secure
It is just the best policy to keep digital information secure
None of the above
Why is information security important?
"In today's high technology environment, organisations are becoming more and more
dependent on their information systems. "
Due to hype in the media about information security.
The threats from traditional brick and motor criminals are on the rise.
Many organisations who are still using offline payment system are depending on information
security
What are the three basic information security concepts?
"Confidentiality, Integrity and Access"
"Consideration, Integrity, and Availability"
"Confidentiality, Integrity, Availability"
None of the above
Verifying that user are who they say they are and that each input arriving at the system came from a
trusted source.
authenticity
integrity
confidentiality .
None of the above
"You visit an organization’s website and you realized that you could view sensitive files on their web
server. Even though it is not your fault, it is still considered an information security breach
TRUE
FALSE
List the three stages in the plan-protect-respond cycle
"Planning, protection, and response."
"Planning, Checking and protecting"
"Plan, do and check"
None of the above
In “plan, protect and response” cycle, which stage consumes the most time
Protection
Planning
Response
It doesn't matter
How is protection defined?
Protection is defined as the plan-based creation of operation and countermeasures.
To use technologies to protect against attacks
To use policy-based protection to protect against attacks
None of the above
How is the response defined?
Response is defined as recovery according to plan.
Punish the attackers so that they don?t attack again
Attack the attackers and destroy their abilities to attack again
Why there is need to understand Threat Environment?
We will not be able to defend as we will not know who are the attackers and how are they
going to attack us.
Business requirements make it essential to understand it.
"It is requirement of information security policy, so we have no choice."

You might also like