0% found this document useful (0 votes)
167 views4 pages

Final Exam Information Systems Security 1

Uploaded by

hamad03malik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
167 views4 pages

Final Exam Information Systems Security 1

Uploaded by

hamad03malik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

College of Engineering and Medical Sciences

Department of Communication and Computer Engineering


Online Exame 2024- Communication and Computer Engineering -Semester 10
Subject : Information Systems Security
Date/18 /5 /2024 time:2 hours

Answer All Questions

Q.1: Choose the best option :

1) - In which of the following attacks the recipient is tricked to disclose private


data or taking another unsafe action.
A. DoS
B. Identity Theft
C. Phishing
D. Ransomware

2) - Which of the following is a non-malicious code?


A. Worm
B. Trojan Horse
C. Buffer overflow
D. None of these

3). in which We can deal with harm ?

A. prevent it B. mitigate it
C. detect it D. all of them
College of Engineering and Medical Sciences
Department of Communication and Computer Engineering
Online Exame 2024- Communication and Computer Engineering -Semester 10
Subject : Information Systems Security
Date/18 /5 /2024 time:2 hours

4). Browser Attack Types?


A. Man-in-the-browser
B. Keystroke Logger
C. page-in-the-middle attack
D. all of them
5). Which of the following can be considered vulnerability?
A. System with no password
B. System with strong password
C Both A & B
D. System with biometric authentication and strong password
6). Threats to Network Communications?

A. interception
B.blocking
C. Both A & B
D. None of all
7). Key Exchange Protocols is prone to?
A. DOS attack B. Man-in-the-Middle attack
C. Virus D. all of them
College of Engineering and Medical Sciences
Department of Communication and Computer Engineering
Online Exame 2024- Communication and Computer Engineering -Semester 10
Subject : Information Systems Security
Date/18 /5 /2024 time:2 hours

8). Overflow Countermeasures is?


A. Check lengths before writing
B. Use string utilities
C.DOS
D. Both A&B
9). Availability of a resource can be effected by?
A. DoS
B. DDoS
C. Both A & B
D. None of these
10) Which of the following is a non-malicious code?
A. Worm
B. Trojan Horse
C. Buffer overflow
D. None of these
College of Engineering and Medical Sciences
Department of Communication and Computer Engineering
Online Exame 2024- Communication and Computer Engineering -Semester 10
Subject : Information Systems Security
Date/18 /5 /2024 time:2 hours

Q.2: Determine whether the following statements are true or false.

1) A virus is a program that can replicate itself and pass on malicious code ( )

2) Hash function is an auxiliary function in cryptography, which is used for


different purposes ( )

3). Integrity-Only unauthorized users can change information ( )

4) The ability of a system to confirm the identity of a sender ( )

5) the ability of a system to confirm that a receiver cannot convincingly deny


having sent something.( )

6) Human Threats: Can be non-malicious or malicious ( )

7) Interruption, or preventing authorized access ( )

8) Biometrics systems is Something the user know. ( )

9) Identity badges, physical keys are something the user has. ( )

10) Building a secure organization is not important to long-term success ( )

Question 3 : What are the different security goals ? Explain

Question 4 : what are Types of Threats ? Explain .

You might also like