aofsorular.com
BİL105U

INFORMATİON TECHNOLOGİES

5. Ünite
Soru 1
Which of the following is the correct definition for Security Breach?
Soru 2
Which of the following is the correct definition of Integrity?
Soru 3
Which of the following means that information should be kept secret, that is, keeping information among persons who authorized to access, no one else can access it.
Soru 4
Which of the following means a service that provides a proof of the integrity and the origin of data. Non-repudiation guarantees that someone who is a part of a contract cannot deny later the authenticity of a signature on the contract.
Soru 5
Which of the following is true about symmetric cryptography?
Soru 6
Which of the following means  the process of claiming user, group or system’s identity.
Soru 7
Which of the following is the forgery of an e-mail header so that the message seems to be sent from someone or somewhere other than the original source.
Soru 8
Which of the following can best complete the sentence below?

"In computer security, any data, device, or any confidential resource that the computer possess is evaluated as a/an _________ which needs to be protected with security tools. Simply, an asset can be considered what it is aimed to be protected from malicious events or attacks."

Soru 9
Which of the following is NOT among the features of Trojan Horse?
Soru 10
Which of the following is NOT among the precautions one can take to protect a computer based system from malicious software?
Soru 11
'Any person, group or force that may intentionally infringe on the integrity, confidentiality and availability of information' is the definition for:
Soru 12
In information technology, which of the following is not one of the principle goals of security?
Soru 13
Correctness and completeness of information as well as the forestalling of unauthorized alteration of information in computers are provided with which service?
Soru 14
One of the most popular block ciphers is:
Soru 15
Which of the following is true regarding public key cryptography?
Soru 16
The process of how one proves that they are who they claim that they are in security controls is called:
Soru 17
The specialized type of spam that attempts to trick you into entering one’s confidential, personal or account information is called:
Soru 18
What does asset in computer security refer to?
Soru 19
Which of the following is not one of the precautions that should be taken to protect a computer based system from malicious software?
Soru 20
Which of the following is true regarding hardware and software security?