aofsorular.com
BİL105U

INFORMATİON TECHNOLOGİES

5. Ünite
Soru 1
"Any person, group or force that may intentionally infringe on the integrity, confidentiality and availability of information."

Which term does the above definition define?

Soru 2
I. Confidentiality

II. Integrity

III. Availability

IV. Non-repudiation

Which of the above are the principle security goals?

Soru 3
Which of the below passwords is a strong password having the necessary features?
Soru 4
"_________is the process of how one proves that they are who they claim that they are."

Which word below completes the above definition?

Soru 5
E-mails that attempt to trick you into entering one's confidenital personal or account information is called _____.
Soru 6
What is the weakness point in the protection efforts that is provided in the system called?
Soru 7
What does the risk assessment phase include?
Soru 8
What are malicious software designed to automatically copy itself from one computer to another, which can consume high bandwidth on the local drive or on the network, affecting the speed of the computer and/or causing the computer to crash called?
Soru 9
Which of the below is something that a hardware trojan do?
Soru 10
Which of the below precautions is wrong?
Soru 11
"Any force that may intentionally infringe on the availability of information is ...."

Which one is appropriate for the blank ?

Soru 12
I. confidentiality

II. integrity

III. availability of information

Which one is principle goal of security ?

Soru 13
.... defines a service that provides proof of the integrity and the origin of data.” ?

Which one is appropriate for the blank ?

Soru 14
In information technology, providing confidentiality service to a computer requires ....”

Which one is appropriate for the blank ?

Soru 15
Denial of service (DoS) attacks are well-known attack type which targets against the ....”

Which one has been working on to establish knowledge societies, which are based on the above considerations ?

Soru 16
A password should be as strong as possible to be resistant to .... where they are trial and error methods used to decrypt the passwords.”

Which one has been encouraging its members to the above considerations ?

Soru 17
A strong password has minimum .... characters, at least .... digit numbers, at least .... upper case letter.”

Which ones are appropriate for the blanks ?

Soru 18
I. RC4

II. A5/1

III. SALSA20

Which one is an important stream cipher ?

Soru 19
I. Data Encryption Standard,

II. Triple Data Encryption Standard

III. Advanced Encryption Standard

Which one is the most important block cipher ?

Soru 20
How many keys does asymmetric encryption require ?