Question#1 Network security protects data during transmission. a) True ✅ - Answer b) False Question#2 A hacker is always an external threat to a system. a) True b) False ✅ - Answer Question#3 A virus replicates the existing program when executed. a) True ✅ - Answer b) False Question#4 Antivirus software can only be installed via online download. a) True b) False ✅ - Answer Question#5 An intruder is the same as a misfeasor. a) True b) False ✅ - Answer Question#6 The CIA triad consists of confidentiality, integrity, and audit. a) True b) False ✅ - Answer Question#7 Integrity ensures data has not been modified. a) True ✅ - Answer b) False Question#8 Availability ensures network access for all users. a) True ✅ - Answer b) False Question#9 The OSI security architecture is not an international standard. a) True b) False ✅ - Answer Question#10 A passive attack affects system resources. a) True b) False ✅ - Answer Question#11 Encryption is a common technique for masking message contents. a) True ✅ - Answer b) False Question#12 An active attack focuses on prevention, not detection. a) True b) False ✅ - Answer Question#13 A replay attack involves capturing and retransmitting data. a) True ✅ - Answer b) False Question#14 Integrity is a security service. a) True ✅ - Answer b) False Question#15 Non-repudiation ensures data is available at all times. a) True b) False ✅ - Answer Question#16 Encipherment is a pervasive security mechanism. a) True b) False ✅ - Answer Question#17 Traffic padding prevents traffic analysis. a) True ✅ - Answer b) False Question#18 Event detection is a pervasive security mechanism. a) True ✅ - Answer b) False Question#19 Eavesdropping always involves active modification of data. a) True b) False ✅ - Answer Question#20 Security recovery deals with requests from event handling. a) True ✅ - Answer b) False