Name:     ID: 
 
Email: 

Computer Security Quiz

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

_____ ensures that the information is correct and that no unauthorized person or malicious software program can or has altered that data.
a.
Availability
c.
Integrity
b.
Confidentiality
d.
Identity
 

 2. 

_____ ensures that only authorized parties can view information.
a.
Security
c.
Integrity
b.
Availability
d.
Confidentiality
 

 3. 

Under the _____ act, healthcare enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.
a.
HIPAA
c.
HCPA
b.
HLPDA
d.
USHIPA
 

 4. 

What is another name for unsolicited e-mail messages?
a.
spam
c.
trash
b.
spawn
d.
scam
 

 5. 

In information security a loss can be _____.
a.
theft of information
b.
a delay in transmitting information that results in a financial penalty
c.
the loss of good will or a reputation
d.
all of the above
 

 6. 

One of the motivations for a hacker to attack network and computer systems is to _____.
a.
harm systems
c.
improve security
b.
earn money
d.
gain recognition
 

 7. 

One of the motivations for a cracker to attack network and computer systems is to _____.
a.
improve security
c.
earn money
b.
harm systems
d.
support ideology
 

 8. 

Maria is a customer service representative who receives a telephone call from someone claiming to be a client asking for their password.  This person has a thick accent that makes his speech hard to understand. Instead of asking the caller to continue repeating himself, Maria provides him with the password. This type of attack is known as a _____ attack.
a.
Birthday
c.
Password Guessing
b.
Social Engineering
d.
Masquerading
 

 9. 

_____ involves digging through trash receptacles to find computer manuals, printouts, or password lists that have been thrown away.
a.
Dumpster diving
c.
Trash sifting
b.
Phishing
d.
Garbage collecting
 

 10. 

Which of the following would be an example of a weak password?
a.
Unstoppable
d.
&uytK%wJGhh
b.
brutus
e.
both a and b
c.
un42n8@ne
 

 11. 

In a _____ attack, an attacker attempts to create every possible password combination by systematically changing one character at a time in a hypothetical password, and then using each newly generated password to access the system.
a.
dictionary
c.
brute force
b.
software exploitation
d.
hashing
 

 12. 

A _____ attack takes advantage of any weakness in software to bypass security that requires a password.
a.
weak key
c.
dictionary
b.
software exploitation
d.
brute force
 

 13. 

What does the Greek word crypto mean?
a.
writing
c.
hidden
b.
secure
d.
secret
 

 14. 

A _____ is a computer program that lies dormant until it is triggered by a specific event, such as a certain date being reached on the system calendar or a persons rank in an organization dropping below a specified level.
a.
logic bomb
c.
worm
b.
Trojan horse
d.
virus
 

 15. 

Because there is no single point of failure, a _____ security approach provides the most comprehensive protection.
a.
diversified
c.
limited
b.
layered
d.
simple
 

 16. 

_____ verifies that a trusted person who has been preapproved for access is actually the one who now demands that access.
a.
Security
c.
Identification
b.
Authentication
d.
Auditing
 

 17. 

Your mothers date of birth and a unique personal identification number (PIN) code provide authentication by _____.
a.
what you do
c.
what you are
b.
what you have
d.
what you know
 

 18. 

A key to unlock a door or a drivers license are methods of authentication by _____.
a.
what you have
c.
what you know
b.
what you are
d.
what you do
 

 19. 

Authentication by _____ is based on a person’s unique characteristics.
a.
who you are
c.
how you are
b.
what you are
d.
what you have
 

 20. 

Which of the following operating system support the Kerberos authentication system?
a.
Windows Server 2003
c.
Linux
b.
Apple Mac OS
d.
all of the above
 

 21. 

Two-way authentication, can be used to combat identity attacks, such as _____.
a.
man-in-the-middle
c.
TCP/IP hijacking
b.
ARP spoofing
d.
mathematical attacks
 

 22. 

_____ consists of the mechanisms for limiting access to resources based on users identities and their membership in various groups.
a.
Multifactor authentication
c.
Access control
b.
Mutual authentication
d.
Auditing
 

 23. 

_____ is the science of transforming information so that it is secure while it is being transmitted or stored.
a.
Steganography
c.
Encryption
b.
Cryptography
d.
Ciphering
 

 24. 

The process of encrypting and decrypting information is based on a mathematical procedure called a(n) _____.
a.
cipher
c.
algorithm
b.
key
d.
hash
 

 25. 

When only trusted users are provided with a cipher and a key to decrypt ciphertext _____ is achieved.
a.
confidentiality
c.
integrity
b.
authentication
d.
access control
 

 26. 

_____ restricts availability to information.
a.
Confidentiality
c.
Nonrepudiation
b.
Integrity
d.
Access control
 

 27. 

Symmetric encryption is also called _____ key cryptography.
a.
private
c.
unique
b.
public
d.
session
 

 28. 

DES encrypts 64-bit plaintext by executing the algorithm _____ times.
a.
4
c.
12
b.
8
d.
16
 

 29. 

How many key sizes does RC6 have?
a.
1
c.
3
b.
2
d.
4
 

 30. 

A _____ key is used in public key cryptography.
a.
public
c.
secret
b.
private
d.
both a and b
 

 31. 

The maximum length of a key in most versions of asymmetric algorithms is 16,638 bits, or _____ characters.
a.
1280
c.
2080
b.
1536
d.
3624
 

 32. 

The _____ asymmetric algorithm is slower than all other algorithms.
a.
RSA
c.
Elliptic curve cryptography
b.
Diffie-Hellman
d.
DES
 

 33. 

A _____ is an encrypted hash of a message that is transmitted along with the message.
a.
message digest
c.
cipher
b.
digital signature
d.
hash algorithm
 

 34. 

Confidentiality can be implemented through _____.
a.
Symmetric cryptography and asymmetric cryptography
b.
Asymmetric cryptography and hashing
c.
Hashing and digital signatures
d.
Symmetric cryptography and hashing
 

 35. 

EFS uses asymmetric cryptography and a per-_____ encryption key to encrypt and decrypt data.
a.
user
c.
volume
b.
folder
d.
file
 

 36. 

What is the name of the Windows 2003 Server command liine utility that can be used to encrypt and decrypt files?
a.
EFS.exe
c.
Crypto.exe
b.
Cipher.exe
d.
Secure.exe
 



 
         Start Over