Confidentiality - protecting information frombeing disclosed to unauthorized parties.InfoSec: C-I-A TriadIntegrity - protecting information from beingchanged by unauthorised parties.Availability - to the availability of information toauthorized parties only when requestedA virus is a program designed to interfere with yourcomputer, device or network’s normal operation. A virusattaches itself in a program or a file and like real-life viruses,computer viruses can multiply or make complete copies ofthemselves when you copy the program or file that it isattached to.1A worm is considered as type of virus. Like a virus, it canmake copies of itself in computers that it comes in contactwith.2. WormA Trojan Horse or simply a Trojan is a type of malware thatdisguises itself as a useful and/or harmless program or file.Unwanted email mostly from bots or advertisers. It can beused to send malware.4. SpamA program designed to send you advertisements, mostly aspop-ups - take the quiz

What is the purpose of confidentiality in information security?
To protect information from unauthorized disclosure
To ensure the availability of information
To prevent unauthorized changes to information
To protect information from viruses and malware
Which of the following is a type of malware that disguises itself as a legitimate program or file?
Virus
Worm
Trojan Horse
Spam
What is the primary goal of integrity in information security?
To protect information from unauthorized disclosure
To ensure the availability of information
To prevent unauthorized changes to information
To protect information from viruses and malware
Which of the following is a common method used to distribute malware through email?
Phishing
Spam
Spoofing
Botnets
Ransomware
True or False: Viruses can replicate themselves within a computer or network.
What is the purpose of availability in information security?
To protect information from unauthorized disclosure
To ensure the confidentiality of information
To prevent unauthorized changes to information
To provide authorized parties access to information when requested
Which of the following is NOT a type of malware?
Virus
Worm
Trojan Horse
Firewall
Ransomware
What is the primary purpose of spam emails?
To deliver advertisements
To distribute malware
To gather personal information
To promote online scams
True or False: Worms can replicate themselves within computers they come in contact with.
What is the C-I-A Triad in information security?
Confidentiality, Integrity, Availability
Compliance, Investigation, Analysis
Control, Identification, Authentication
Cybersecurity, Intrusion Detection, Antivirus
{"name":"Confidentiality - protecting information frombeing disclosed to unauthorized parties.InfoSec: C-I-A TriadIntegrity - protecting information from beingchanged by unauthorised parties.Availability - to the availability of information toauthorized parties only when requestedA virus is a program designed to interfere with yourcomputer, device or network’s normal operation. A virusattaches itself in a program or a file and like real-life viruses,computer viruses can multiply or make complete copies ofthemselves when you copy the program or file that it isattached to.1A worm is considered as type of virus. Like a virus, it canmake copies of itself in computers that it comes in contactwith.2. WormA Trojan Horse or simply a Trojan is a type of malware thatdisguises itself as a useful and\/or harmless program or file.Unwanted email mostly from bots or advertisers. It can beused to send malware.4. SpamA program designed to send you advertisements, mostly aspop-ups - take the quiz", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"What is the purpose of confidentiality in information security?, Which of the following is a type of malware that disguises itself as a legitimate program or file?, What is the primary goal of integrity in information security?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker