10 questions
This attack is designed to hinder the normal operation of a website or other network resources.
DDoS Attack
Phishing
PoS Attack
Ransomware
What is your best defense against virus infection?
Don't download files from the Internet
Don't open e-mail attachments you're not expecting
Don't surf the Internet
Don't use disks to transfer data
What is the best way to ensure effectiveness of antivirus software?
Run the antivirus software at least every hour
Test the software by infecting your machine with a virus
Install the latest version and update security patches
Use the outdated antivirus software
What is the biggest vulnerability to computer information security?
Instant messaging
Spam and phishing attacks
Malware - virus, worms, spyware
End users
Which one is most vulnerable from the list below?
SSH
SecureVPN
HTTPS
Telnet
Viruses can only be sent by E-mail.
True
False
What is firewall used for?
Prevent hackers from internet
Virus protection
To access network remotely
Control traffic between internal network and internet
Information security aims to provide which three key services?
Data Strategy, Data Integrity, Data Storage
Data Integrity, Data Availability, Data Confidentiality
Data Availability, Data Storage, Data Mining
Data mining, Data Confidentiality, Data Storage
Below are the tips for good password management except:
Use the same password over and over again
Change password often
Avoid using simple adjacent keyboard combination as your password
Make difficult to guess password
A brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.
True
False