BİL105U
INFORMATİON TECHNOLOGİES
5. Ünite
Soru 1
Which of the following term refers to any group or force that may intentionally infringe on the integrity, confidentiality and availability of information?
Soru 2
Which of the following terms refers to a software or hardware failure or incompleteness which could result in a breach of access in computer security?
Soru 3
Which of the following describes the ability of a system to maintain its function for a certain period of time?
Soru 4
Which of the following should be included in the question mark in the figure below?
Soru 5
Which of the following means preventing information from being changed by unauthorized persons?
Soru 6
Which of the following are suitable for the numbers listed below?
Soru 7
Which of the following is the definition of e-mail phishing?
Soru 8
Which of the following best refers to an action or possible event to violate the security of the system by exploiting known or unknown vulnerabilities?
Soru 9
Which of the following is not a best practice for avoiding security threats in a computer?
Soru 10
Which of the following would be an accurate equation when a function definition of the threats using the vulnerabilities in the system is needed to obtain, modify, damage or destroy the available assets of the system?
Soru 11
Which one of the following terms refers to any person, group or force that may intentionally infringe on the integrity, confidentiality and availability of information?
Soru 12
I. Confidentiality
II. Availability
III. Integrity
IV. Privacy
Which of the above are the goals of security?
Soru 13
I. John wants to send a message to Mary. John encrypts the message with a key which is known only by John and Mary. Mary decypts the encrypted message with the same key.II. John wants to send a message to Mary. Mary has a key pair in which one of the keys is known by only Mary and the other one is known by everyone. John encrypts the message with Mary's key which is known by everyone. Mary decrypts the message with her key which is only known by herself.There are two different message sending scenarios above. Which one of the following is the correct pair of cryptographic algorithms appropriate for the scenarios?
Soru 14
I. If John encrypts a message with his private key both July and Mary can decrypt the message.II. If John encypts a message with Mary's public key, July can decrypt the message.III. If John takes a message encrypted by his public key, he think that the message is sent by July.There is a communication channel between John, Mary ang July. Each of the participiants has a key pair in which one of the keys is public and the other one is private. Which one of the above expressions is / are definitely true?
Soru 15
Authentication is the process of how one proves that they are who they claim that they are. According to the given expression which one of the following can not be used as authentication?
Soru 16
Which one of the following refers to anything on a computer that may harm or copy the data, or allow one to access the computer without anyone’s knowledge?
Soru 17
"A web site informs its users about the risk of losing some of their confidential data." Considering the possible actions of risk management, given action may be an example of which of the following?
Soru 18
"... creates an environment that allows its programmer to open a certain channel on the system, allowing the attacker to monitor or control the infected user’s system."
Which one of the following is the best appropriate term for the given gap?
Soru 19
Which one of the following is not one of the precautions to protect a computer from malicious software?
Soru 20
Which one of the following refers to a degree of protection of computer hardware and software from intentional or unintentional changes, uses, spoofing, spread of information over unauthorized people?