Information Security(Computer Science ) Questions and Answers

Question 1. In what year does creeper was changed to reaper?
  1.    1960s
  2.    1970s
  3.    1990s
  4.    2010s
Explanation:-
Answer: Option B. -> 1970s

Question 2. Which of the following search queries will allow you to search the Internet for hardware-specific keyloggers with the best result?
  1.    keylogger -hardware
  2.    Site:hardware keylogger
  3.    keylogger +hardware
  4.    keylogger -software +hardware
Explanation:-
Answer: Option D. -> keylogger -software +hardware

Question 3. What does 'integrity of data' mean?
  1.    "Accuracy and completeness of the data"
  2.    "Data should be viewable at all times"
  3.    "Data should be access by only the right people"
  4.    "None of the above"
Explanation:-
Answer: Option A. -> "Accuracy and completeness of the data"

Question 4. A ____ occurs when an antimalware program identifies a file as malware, but the file is a valid, nonmalicious file
  1.    false positive
  2.    false negative
  3.    true positive
  4.    true negative
Explanation:-
Answer: Option A. -> false positive

Question 5. Which best describes the results of the following search-engine query:World cup soccer -England
  1.    Search results show only world-cup soccer links to the England team
  2.    Search results show world-cup soccer prioritizing links for the England team
  3.    Search results show world-cup soccer omitting references to the England team
  4.    Search results show world-cup soccer deprioritizing links to the England
Explanation:-
Answer: Option C. -> Search results show world-cup soccer omitting references to the England team

Question 6. Type of malware that inserts snippets of code inside Microsoft Office type files
  1.    Logic Bomb
  2.    Worm
  3.    Rootkit
  4.    Macro virus
Explanation:-
Answer: Option D. -> Macro virus

Question 7. Which of the following is true aboutphishing?
  1.    Phishing is an act of catching fish for dinner.
  2.    Phishing is an attemptto acquire sensitive information such as passwords for malicious reasons.
  3.    Phishing is forgetting your password andcontacting IT to reset.
  4.    Phishing is a virus that will not allow you tolog onto your computer.
Explanation:-
Answer: Option B. -> Phishing is an attemptto acquire sensitive information such as passwords for malicious reasons.

Question 8. What is one way that you can preventidentity theft?
  1.    Maxing out your credit card
  2.    Throwing personal documents away withoutshredding them
  3.    Opening several accounts
  4.    Examining bank accountson a regular basis
Explanation:-
Answer: Option D. -> Examining bank accountson a regular basis

Question 9. Which security principles are covered by the CIA triad?
  1.    certified, integrated, accessible
  2.    continuity, integrity, accessibility
  3.    confidentiality, integrity, availability
  4.    confidentiality, installation, assembly
Explanation:-
Answer: Option C. -> confidentiality, integrity, availability

Question 10. Which is an example of PII? (Personally Identifiable Information)
  1.    Credit Card Number
  2.    Name
  3.    Home Address
  4.    All of the above
Explanation:-
Answer: Option D. -> All of the above