Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

10/20/23, 10:48 PM PRELIM EXAM: Attempt review

Home / My courses / UGRD-IT6206A-2313T / PRELIM EXAM / PRELIM EXAM

Started on Friday, 20 October 2023, 8:58 PM


State Finished
Completed on Friday, 20 October 2023, 9:12 PM
Time taken 13 mins 9 secs
Marks 48.00/50.00
Grade 96.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

It means nonpublic information that Microsoft designates as being confidential or which, under the circumstances surrounding
disclosure ought to be treated as confidential by the Recipient.

Answer: CONFIDENTIAL INFORMATION 

Question 2
Correct

Mark 1.00 out of 1.00

It often has confidential information clause(s), which is (are) inserted to protect the information they deem proprietary and sensitive
from disclosure to unauthorized third parties.

Answer: BUSINESS CONTRACTS 

Question 3
Correct

Mark 1.00 out of 1.00

Information security is considered as a disruption in the daily activities of a certain company.

Select one:
True

False 

https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 1/13
10/20/23, 10:48 PM PRELIM EXAM: Attempt review

Question 4

Correct

Mark 1.00 out of 1.00

Despite the seemingly benign threats in these regions, travelers are still advised to practice caution and to stay aware of threats to
their person, especially if traveling during the Asia-Pacific typhoon season.

Select one:
True 

False

Question 5
Correct

Mark 1.00 out of 1.00

One should keep a second set of keys in a safe place because the information can be lost or taken advantage of if he cannot access it
or if he cannot access it on time in case of loss or theft of the first set of keys.

Answer: SAFEGUARD YOUR KEYS 

Question 6

Incorrect

Mark 0.00 out of 1.00

They are also recommended to upgrade computer systems and ensure programs continue to work through maintenance and testing.

Answer: SOFTWARE MAINTENANCE 

Question 7
Correct

Mark 1.00 out of 1.00

These are software that prevents malware from penetrating the machines.

Answer: SOFTWARE CONTROLS 

https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 2/13
10/20/23, 10:48 PM PRELIM EXAM: Attempt review

Question 8

Correct

Mark 1.00 out of 1.00

Political risks (inc. petty & violent crime, civil conflicts, protests, strikes, and terrorism)

Select one:
True

False 

Question 9
Correct

Mark 1.00 out of 1.00

It enables you to access the information only if you have both a physical object (like a card) and an immaterial one (like a security
code).

Answer: TWO-FACTOR AUTHENTICATION 

Question 10
Correct

Mark 1.00 out of 1.00

It occurs by utilizing character substitution with a key that will be the only means of decrypting the bits of information.

Answer: SYMMETRIC ENCRYPTION 

Question 11

Correct

Mark 1.00 out of 1.00

The user utilizes software and initiates the encryption.

Answer: MANUAL ENCRYPTION 

https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 3/13
10/20/23, 10:48 PM PRELIM EXAM: Attempt review

Question 12

Correct

Mark 1.00 out of 1.00

As cyber attack threats increase, information security experts are pushing for more focus on protecting the companies from losing
time due to network defense disruptions.

Select one:
True 

False

Question 13
Correct

Mark 1.00 out of 1.00

This is used when there are two keys, a public key, and a private key.

Answer: ASYMMETRIC ENCRYPTION 

Question 14

Correct

Mark 1.00 out of 1.00

A principle that is a core requirement of information security for the safe utilization, flow, and storage of information is the CIA triad.

Select one:
True 

False

Question 15
Correct

Mark 1.00 out of 1.00

Internet of things (IoT) is an easy way for cybercriminals to invade businesses.

Select one:
True 

False

https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 4/13
10/20/23, 10:48 PM PRELIM EXAM: Attempt review

Question 16

Correct

Mark 1.00 out of 1.00

The aim of confidentiality is to ensure that information is hidden from people unauthorized to access it.

Select one:
True 

False

Question 17
Correct

Mark 1.00 out of 1.00

Cryptography consists of changing the data located in files into unreadable bits of characters unless a key to decode the file is
provided.

Select one:
True

False 

Question 18
Correct

Mark 1.00 out of 1.00

Regulatory compliances enforce information security measures.

Select one:
True 

False

Question 19
Correct

Mark 1.00 out of 1.00

It utilizes packet filtering to examine the header of a packet and decide if the packet should be forwarded or dropped.

Answer: HARDWARE FIREWALL 

https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 5/13
10/20/23, 10:48 PM PRELIM EXAM: Attempt review

Question 20

Correct

Mark 1.00 out of 1.00

Information security, otherwise called Infosec, is a procedure of planning techniques, instruments, and approaches to identify, report,
avert, and battle dangers focused on computerized and non-advanced data gadgets.

Select one:
True 

False

Question 21
Correct

Mark 1.00 out of 1.00

Organizations do not recognize the importance of having roadblocks to protect private information from becoming public.

Select one:
True

False 

Question 22
Correct

Mark 1.00 out of 1.00

This principle dictates that information should solely be viewed by people with appropriate and correct privileges.

Answer: CONFIDENTIALITY 

Question 23
Correct

Mark 1.00 out of 1.00

It should be a mixture of lowercase and uppercase letters, numbers, and symbols and be at least 10 characters long, preferably 12 or
more.

Answer: SECURITY CODE OR PASSWORD 

https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 6/13
10/20/23, 10:48 PM PRELIM EXAM: Attempt review

Question 24

Correct

Mark 1.00 out of 1.00

It describes the notion that access to end-user applications has to be constrained to business ought-to-know.

Answer: APPLICATION ACCESS LAYER 

Question 25
Correct

Mark 1.00 out of 1.00

Modem, another piece of hardware, can regulate access to the network, just like firewalls, it may have access lists that allow or deny
access into the network.

Select one:
True

False 

Question 26
Correct

Mark 1.00 out of 1.00

They create an in-office network for a small business or a cloud infrastructure for a business with corporate locations in cities on
opposite coasts.

Answer: COMPUTER NETWORK ARCHITECT 

Question 27
Correct

Mark 1.00 out of 1.00

An accepted and effective way of protecting data in transit but is increasingly being used for protecting data at rest as well.

Answer: ENCRYPTION 

https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 7/13
10/20/23, 10:48 PM PRELIM EXAM: Attempt review

Question 28

Correct

Mark 1.00 out of 1.00

A piece of equipment or software that is designed to block unsolicited connections, protocols, unwanted network activity, and block
spam and other malicious requests while you are connected to a third-party network (usually the Internet).

Answer: FIREWALL 

Question 29
Correct

Mark 1.00 out of 1.00

The establishment of the Enigma rotor machine and the subsequent emergence of electronics and computing enabled the usage of
much more elaborate schemes and allowed confidentiality to be protected much more effectively.

Select one:
True 

False

Question 30
Correct

Mark 1.00 out of 1.00

It enforces information security measures, and the violation of these may cost heavily to the businesses.

Answer: REGULATORY COMPLIANCES 

Question 31

Correct

Mark 1.00 out of 1.00

Travelers may also find it challenging to get around certain due to poor aviation safety standards and large areas of poorly
maintained roads that make driving difficult.

Select one:
True 

False

https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 8/13
10/20/23, 10:48 PM PRELIM EXAM: Attempt review

Question 32

Correct

Mark 1.00 out of 1.00

Requiring two-factor authentication increases the safety of the confidential data and decreases the probability of data leakage.

Select one:
True 

False

Question 33
Incorrect

Mark 0.00 out of 1.00

Its threats account for 25% of more than $600 billion in costs of cybercrime to the world economy.

Answer: CYBERCRIME 

Question 34

Correct

Mark 1.00 out of 1.00

It can occur even without a signed confidentiality provision or agreement.

Answer: BREACH OF CONFIDENTIALITY 

Question 35
Correct

Mark 1.00 out of 1.00

They are implemented at the local level; they involve authentication like logins and passwords.

Answer: NETWORK CONTROLS 

https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 9/13
10/20/23, 10:48 PM PRELIM EXAM: Attempt review

Question 36

Correct

Mark 1.00 out of 1.00

Drafting a successful confidentiality agreement that would effectively protect confidential data.

Select one:
True 

False

Question 37
Correct

Mark 1.00 out of 1.00

Information is a vital resource for an organization.

Select one:
True 

False

Question 38
Correct

Mark 1.00 out of 1.00

The Application Access Layer describes the notion that data ought to be secured while in motion.

Select one:
True

False 

Question 39
Correct

Mark 1.00 out of 1.00

It describes the notion that the physical access to any system, server, computer, data center, or another physical object storing
confidential information has to be constrained to business ought-to-know.

Answer: PHYSICAL ACCESS LAYER 

https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 10/13
10/20/23, 10:48 PM PRELIM EXAM: Attempt review

Question 40

Correct

Mark 1.00 out of 1.00

When information security community members participated in the Cybersecurity Trends Report, they were asked how positive they
felt about the security stance.

Select one:
True 

False

Question 41
Correct

Mark 1.00 out of 1.00

Environmental risks (inc. road safety and standards, provision of utilities such as electricity, cybercrime, and aviation security and
standards).

Select one:
True

False 

Question 42

Correct

Mark 1.00 out of 1.00

Information security analysts monitor the designs of computer programs and applications and design how those pieces work
together.

Select one:
True

False 

Question 43
Correct

Mark 1.00 out of 1.00

They are implemented at the local level; they involve authentication like logins and passwords.

Answer: NETWORK CONTROLS 

https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 11/13
10/20/23, 10:48 PM PRELIM EXAM: Attempt review

Question 44

Correct

Mark 1.00 out of 1.00

Information systems managers work towards ensuring the company’s technology is capable of meeting their IT goals.

Select one:
True 

False

Question 45
Correct

Mark 1.00 out of 1.00

It consists of the presence of diseases, the standard of medical facilities, access to water, and the availability of pharmaceuticals.

Answer: MEDICAL RISKS 

Question 46
Correct

Mark 1.00 out of 1.00

Encryption is an accepted and effective way of protecting data in transit but is increasingly being used for protecting data at rest as
well.

Select one:
True 

False

Question 47
Correct

Mark 1.00 out of 1.00

The Infrastructure Access Layer describes the notion that access to end-user applications has to be constrained to business ought-to-
know.

Select one:
True

False 

https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 12/13
10/20/23, 10:48 PM PRELIM EXAM: Attempt review

Question 48

Correct

Mark 1.00 out of 1.00

The computer network architects monitor the company’s computer networks to combat hackers and compile reports of security
breaches.

Select one:
True

False 

Question 49
Correct

Mark 1.00 out of 1.00

The encryption happens automatically without any intervention on the side of the user.

Answer: TRANSPARENT ENCRYPTION 

Question 50

Correct

Mark 1.00 out of 1.00

It includes road safety and standards, provision of utilities such as electricity, cybercrime, and aviation security and standards.

Answer: INFRASTRUCTURAL RISKS 

◄ Announcements

Jump to...

Prelim Lab Exam ►

https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 13/13

You might also like