BİL105U
INFORMATİON TECHNOLOGİES - Deneme Sınavı - 12
Dönem Sonu Sınavı
44732
Soru 1
'Any person, group or force that may intentionally infringe on the integrity, confidentiality and availability of information' is the definition for:
Soru 2
In information technology, which of the following is not one of the principle goals of security?
Soru 3
Correctness and completeness of information as well as the forestalling of unauthorized alteration of information in computers are provided with which service?
Soru 4
One of the most popular block ciphers is:
Soru 5
Which of the following is true regarding public key cryptography?
Soru 6
The process of how one proves that they are who they claim that they are in security controls is called:
Soru 7
The specialized type of spam that attempts to trick you into entering one’s confidential, personal or account information is called:
Soru 8
What does asset in computer security refer to?
Soru 9
Which of the following is not one of the precautions that should be taken to protect a computer based system from malicious software?
Soru 10
Which of the following is true regarding hardware and software security?
Soru 11
"Any person, group or force that may intentionally infringe on the integrity, confidentiality and availability of information."
Which term does the above definition define?
Soru 12
I. Confidentiality
II. Integrity
III. Availability
IV. Non-repudiation
Which of the above are the principle security goals?
Soru 13
Which of the below passwords is a strong password having the necessary features?
Soru 14
"_________is the process of how one proves that they are who they claim that they are."
Which word below completes the above definition?
Soru 15
E-mails that attempt to trick you into entering one's confidenital personal or account information is called _____.
Soru 16
What is the weakness point in the protection efforts that is provided in the system called?
Soru 17
What does the risk assessment phase include?
Soru 18
What are malicious software designed to automatically copy itself from one computer to another, which can consume high bandwidth on the local drive or on the network, affecting the speed of the computer and/or causing the computer to crash called?
Soru 19
Which of the below is something that a hardware trojan do?
Soru 20
Which of the below precautions is wrong?