Question#1 What is the primary purpose of computer security? a) To protect data and prevent hackers ✅ - Answer b) To increase the speed of the computer c) To reduce the cost of software d) To enhance the visual appearance of the system Question#2 Which of the following is a type of virus that mutates with every infection? a) Parasitic virus b) Memory-resident virus c) Polymorphic virus ✅ - Answer d) Boot sector virus Question#3 What does the 'C' in CIA triad stand for? a) Confidentiality ✅ - Answer b) Control c) Communication d) Configuration Question#4 Which security service ensures that data has not been modified? a) Confidentiality b) Integrity ✅ - Answer c) Availability d) Non-repudiation Question#5 What is the main goal of a passive attack? a) To modify the data b) To obtain information without affecting system resources ✅ - Answer c) To disrupt the network d) To delete files Question#6 Which mechanism is used to assure the integrity of a data unit? a) Encipherment b) Digital signature c) Access control d) Data integrity ✅ - Answer Question#7 What is a masquerader in the context of intruders? a) A legitimate user who misuses privileges b) An individual not authorized to use the computer ✅ - Answer c) A trusted third party d) A system administrator Question#8 Which of the following is a common method to protect against confidentiality breaches? a) Using multi-factor authentication ✅ - Answer b) Increasing network speed c) Reducing the number of users d) Disabling all security measures Question#9 What is the purpose of traffic padding in security mechanisms? a) To speed up data transmission b) To frustrate traffic analysis attempts ✅ - Answer c) To reduce the size of data d) To encrypt all data automatically Question#10 Which type of attack involves the creation of a false data stream? a) Passive attack b) Active attack ✅ - Answer c) Eavesdropping d) Denial of service Question#11 What is the main objective of viruses? a) To improve system performance b) To spread along different hosts ✅ - Answer c) To reduce network traffic d) To enhance user experience Question#12 Which of the following is not a pillar of information security? a) Confidentiality b) Integrity c) Availability d) Transparency ✅ - Answer Question#13 What does a stealth virus do to avoid detection? a) It changes its appearance and behavior ✅ - Answer b) It deletes itself after infection c) It speeds up the system d) It asks for user permission Question#14 Which security mechanism involves the use of a trusted third party? a) Encipherment b) Digital signature c) Notarization ✅ - Answer d) Access control Question#15 What is the primary difference between active and passive attacks? a) Active attacks modify data, passive attacks do not ✅ - Answer b) Passive attacks are more harmful c) Active attacks are easier to prevent d) Passive attacks target hardware Question#16 Which of the following is a feature of modern antivirus programs? a) Network firewall ✅ - Answer b) Increased system speed c) Reduced power consumption d) Automatic software updates Question#17 What is the purpose of the OSI security architecture? a) To define security attacks, mechanisms, and services ✅ - Answer b) To increase network speed c) To reduce the cost of security d) To simplify user interfaces Question#18 Which type of virus infects the master boot record? a) Parasitic virus b) Memory-resident virus c) Boot sector virus ✅ - Answer d) Polymorphic virus Question#19 What is the main purpose of encryption in network security? a) To increase data transmission speed b) To mask the contents of messages ✅ - Answer c) To reduce the size of data d) To simplify data management Question#20 Which of the following is a method to ensure data availability? a) Using redundant networks ✅ - Answer b) Deleting old data c) Reducing user access d) Disabling security measures