+ All Categories
Home > Documents > 030010305-Foundations of Computer Security 2014030010305-Foundations of Computer Security 2014 Mr....

030010305-Foundations of Computer Security 2014030010305-Foundations of Computer Security 2014 Mr....

Date post: 28-Sep-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
4
030010305- Foundations of Computer Security 2014 Mr. Amish Patel Page 1 Unit 1: Short Answer Questions: 1. What activity does a security solution focuses in order to achieve the protection? 2. To provide safe environment for children to grow and learn computer but also not to allow them use of e-mail, chat rooms and instant messenger facilities; What type of measure & security control to be placed on your computer in order to achieve the goal? 3. Is it possible to protect your computer using best practices? How? 4. List any two precautions while a user chatting to unknown personality. 5. What consequence occurs if your file is corrupted and you are having no backup? 6. State the objective of placing DSL router to your computer while using broadband. 7. How can a key logger be used to commit a cyber crime? Name a tool to detect key logger installed on your computer. Long Answer Questions: 1. While using computer for surfing general website (i.e. Internet) and for Online banking (i.e. personal finance), which of one is having more risk? Justify by providing two points of differentiation. 2. Approximately 67 percent of teens admit to "having tried, on at least one occasion, to hack into friends' instant messaging or social network accounts". [1] From the above data, What care should be taken by a victim for preventing the attack? Also, Educating attacker (students) as well as victim can help in preventing future attacks. Justify the statement. [1] http://en.wikibooks.org/wiki/Information_Security_in_Education/Case_Studies 3. Name the category of a person who is comfortable using a computer and using computer for several years. Explain in brief other types of users according to the level of their experience. 4. State the reasons for a need to protect your computer. Explain any two in brief. 5. What happens when you don't protect your computer? 6. List any four best practices that should be followed by an individual in order to protect from different types of attacks. Explain any two in brief. 7. Compose four best practices to be followed by organization to get secured. Fill in the blanks with appropriate answer: 1. The goal of all computer security solutions is to ________ your information from the threats. 2. When you shop online you should check the merchants __________ to make sure that you are protected. 3. A worm known as the _________ virus was a widespread virus that sent out word documents after the document was opened. 4. The best way to secure your computer and your privacy is through ______________. 5. The purpose of _______________ are to ensure that interaction with your computer match a certain criteria before they are considered valid. 6. If someone gains access to your personal information, they can use it to __________ your identity.
Transcript
Page 1: 030010305-Foundations of Computer Security 2014030010305-Foundations of Computer Security 2014 Mr. Amish Patel Page 3 5. State the use of behavior blocking. 6. Write name of a report

030010305- Foundations of Computer Security 2014

Mr. Amish Patel Page 1

Unit 1:

Short Answer Questions:1. What activity does a security solution focuses in order to achieve the protection?2. To provide safe environment for children to grow and learn computer but also not to allowthem use of e-mail, chat rooms and instant messenger facilities; What type of measure &security control to be placed on your computer in order to achieve the goal?3. Is it possible to protect your computer using best practices? How?4. List any two precautions while a user chatting to unknown personality.5. What consequence occurs if your file is corrupted and you are having no backup?6. State the objective of placing DSL router to your computer while using broadband.7. How can a key logger be used to commit a cyber crime? Name a tool to detect key loggerinstalled on your computer.Long Answer Questions:1. While using computer for surfing general website (i.e. Internet) and for Online banking (i.e.personal finance), which of one is having more risk? Justify by providing two points ofdifferentiation.2. Approximately 67 percent of teens admit to "having tried, on at least one occasion, to hackinto friends' instant messaging or social network accounts". [1]From the above data, What care should be taken by a victim for preventing the attack? Also,Educating attacker (students) as well as victim can help in preventing future attacks. Justifythe statement.[1] http://en.wikibooks.org/wiki/Information_Security_in_Education/Case_Studies3. Name the category of a person who is comfortable using a computer and using computer forseveral years. Explain in brief other types of users according to the level of their experience.4. State the reasons for a need to protect your computer. Explain any two in brief.5. What happens when you don't protect your computer?6. List any four best practices that should be followed by an individual in order to protect fromdifferent types of attacks. Explain any two in brief.7. Compose four best practices to be followed by organization to get secured.Fill in the blanks with appropriate answer:1. The goal of all computer security solutions is to ________ your information from the threats.2. When you shop online you should check the merchants __________ to make sure that you areprotected.3. A worm known as the _________ virus was a widespread virus that sent out word documentsafter the document was opened.4. The best way to secure your computer and your privacy is through ______________.5. The purpose of _______________ are to ensure that interaction with your computer match acertain criteria before they are considered valid.6. If someone gains access to your personal information, they can use it to __________ youridentity.

Page 2: 030010305-Foundations of Computer Security 2014030010305-Foundations of Computer Security 2014 Mr. Amish Patel Page 3 5. State the use of behavior blocking. 6. Write name of a report

030010305- Foundations of Computer Security 2014

Mr. Amish Patel Page 2

7. Computers are the filing ___________ and diaries of the new millennium.8. Viruses, Worms and ___________ are the most prevalent types of problems that is faced whileusing computer.9. ______________ is designed to snoop into your usage habits and report them to a remotesystem.10. Software that __________________ can cause your system to be difficult to use.11. _________________ is one of the worst things that happen to a computer user.12. A _____________ is someone who is very comfortable using a computer.13. Computers are great way to balance your checkbook and manage your ____________.14. Applications like ____________ allow you to do your takes on your computer.15. If hacker gain unauthorized access to your computer, they will be able to get information on______________ you develop and produce.16. _______________ is a type of application that manages files containing pictures, videos,animation and audio.17. ____________ help provide against hackers and malicious application that attack yourcomputer.18. A ________________ is a password with six or more characters that has lowercase, uppercase,numbers and special characters.State whether below given statements are ‘True’ or ‘False’:1. Only firewall helps us to prevent your computer.2. If your computers become infected with virus, it is possible for your files to becomemangled or deleted.3. Computer security cannot be achieved through policies, procedures and tools.4. The purpose of security policies are to ensure that interaction with your computer match acertain criteria.5. Policies that deal with software can prevent you from running certain application orrunning only certain applications at specific times.6. It is not possible to avoid security problems even if you configure your computer properlyand have basic understanding of cyberspace.7. Quicken make balancing a checkbook and helps in preparing information for taxes.8. If your identity is stolen, the consequences can be maxed-out.9. Kevin Metnick a famous hacker, uses social engineering along with technical skill to get theinformation that he wants.10. Spyware is a software that displays advertisements on your computer.11. Novice is a lack of comfort around a computer and a fear that he will damage the computer.Unit 2:

Short Answer Questions:1. Which viruses are like biological viruses and attack certain parts of computer?2. How macro viruses take advantage of the macro support in the Microsoft Office suite ofapplications?3. What consequences occurred when LoveBug infected millions of computer?4. Which blended threat is a well known that attacks Microsoft’s IIS or web server?

Page 3: 030010305-Foundations of Computer Security 2014030010305-Foundations of Computer Security 2014 Mr. Amish Patel Page 3 5. State the use of behavior blocking. 6. Write name of a report

030010305- Foundations of Computer Security 2014

Mr. Amish Patel Page 3

5. State the use of behavior blocking.6. Write name of a report about a nonexistent virus.7. List two software’s that provides adware versions of products to support development.8. State traditional purpose of designing browser helper objects.Long Answer Questions:1. Analyze the impact of boot sector viruses on hard drives.2. How Malware can be used to discuss malicious applications that can harm your computer?3. Trojans are not self-replicating. Justify the statement.4. Compare and contrast viruses and worms.5. How can you evaluate the symptoms of an infected computer?6. Explain the antibiotics and vaccines for computers to protect them from attacks.7. Identify the threats that are not protected against antivirus software.8. Which parts of the computer can be affected by computer viruses?9. You receive an e-mail with an attachment from "I.T. Security." The e-mail says that yourcomputer has been infected with a virus and you need to open the attachment and followthe directions to get rid of the virus. What should you do? Choose the best step from thebelow given alternatives and justify the reason.

a. Follow the instructions as soon as possible to avoid the virus.b. Open the e-mail attachment to see what it says.c. Reply to the sender and say "take me off this list".d. Delete the message from the unknown source.e. Contact the IT Help Desk and ask about the email.10. The mouse on your computer screen starts to move around on its own and click on thingson your desktop. What do you do? Choose the best step from the below given alternativesand justify the reason.a. Call your co-workers over so they can see.b. Disconnect your computer from the network.c. Unplug your mouse.d. Tell your supervisor.e. Turn your computer off.f. Run anti-virus.

Fill in the blanks with appropriate answer:1. Computer viruses like ____________, attack certain parts of the host.2. ___________ is a section of the hard drive that is used to tell your computer about how thehard drive is configured so your system can boot.3. Viruses can stay in _____________ and infect other applications until the infection is cleaned up.4. Boot sector viruses attack specific locations on _______________.5. A _________, like a virus is a self replicating piece code, but it doesn’t require a host.6. _______________ can capture and send credit cards, passwords, and your web usage to anoutside party.7. A ____________ is a computer application that requires a specific condition to occur before themalicious code is executed.8. ____________ are computer viruses that attack antivirus software.9. Antivirus products only modify an email if they detect that the email is ______________.

Page 4: 030010305-Foundations of Computer Security 2014030010305-Foundations of Computer Security 2014 Mr. Amish Patel Page 3 5. State the use of behavior blocking. 6. Write name of a report

030010305- Foundations of Computer Security 2014

Mr. Amish Patel Page 4

10. _____________ products are designed to protect your computer from viruses and malicioussoftware.11. Virus definitions are files that contain the __________ of malicious code that can infect yoursystem.12. ______________ is a term used to describe technologies that block malicious applications fromaccessing parts of your operating system.13. Spyware is a type of application that _______________ information about how you use yourcomputer.14. Antivirus products scan email in a way that is very similar to ___________ file scanning.15. __________ is NIS’s method of updating the product’s virus definitions and code.State whether below given statements are ‘True’ or ‘False’:1. Computer viruses use your computer as the host to spread.2. Viruses target boot sector to ensure that they are loaded into memory every time themachine is started.3. Macro viruses do not take advantage of the macro support in the Microsoft Office suite ofapplications.4. The Melissa is was one of the fastest spreading e-mail viruses ever released.5. A famous worm, known as LoveBug infected only some of computers and disrupted mail.6. Browser hijackers get installed on your machine by a technique called drive-by download.7. Logic Bombs are not designed to damage data by reformatting your hard drive.8. Code Red is a well-known blended threat that attack IIS, a web server.9. The computer viruses that are written for research are considered as zoo viruses.10. Antivirus products do not help to prevent from malicious code.11. Real time scan prevent future infection by scanning a file when it is opened, written orexecuted.12. Threats cannot spread faster can virus definitions can be written and distributed.13. The email scanning works when you only receive email using a client like Outlook.14. Behavior blocking is used to describe technologies that block malicious applications fromaccessing parts of your operating systems.


Recommended