Exam Format - Read before studying

32 MCQ questions  |  Pass: 22/32  |  Time: 55 minutes  |  Wrong answer: −1/3 point  |  Uncertain checkbox: halves both reward and penalty  |  Empty answer: 0 points (no penalty)

Answers revealed 0 / 141

Q1

What is required of an attack to be regarded as a cyber attack?

Q2

Denial of service is a term

Q3

What makes a denial of service attack (DoS) a distributed DoS?

Q4

The term attack vector

Q5

Confidentiality is one of the three basic goals ("C-I-A") of information security,

Q1

The term script kiddie is used for certain types of attackers. What is typical of them from a defender's perspective?

Q2

Attackers that are called script kiddies are characterized by

Q3

Identity theft

Q4

There are many digitals entities that spread mainly by the forwarding action of people. Some of them are not direct risks to computing. How many of that kind of user-spread entities are in this list: spam, hoax, ransomware, meme virus, Nigerian letter, troll?

Q5

All of the following attacks have some social aspect, but which description gives the best coverage for the concept of social engineering?

Q6

Successful impersonation means that

Q1

An attacker, who is not a legitimate party of a conversation, but still attempts to know its contents, is called

Q2

What is a description of a dictionary attack?

Q3

Backdoor

Q4

Ransomware is

Q5

How can an attack be passive?

Q1

Malware that does not replicate, pretends to be performing a legitimate action, but does something else in the background is called

Q2

What is a common feature of all malicious programs?

Q3

A macro virus is malware that

Q4

There are many terms that mean some sort of showing or coming out of a covering. The term that is used to mean such kind of a vulnerability in an information system is

Q5

What is the term used for an attack or error that causes data to be written in memory locations that are outside the allowed area?

Q6

The term zero-day applies for instance to

Q1

Which of the following fits most poorly to the concept of a bot network?

Q2

Man in the middle is an attack type where

Q3

A botnet is

Q1

Information assurance is sometimes considered a wider term than information security. On the other hand, assurance is just part of information security, namely

Q2

Authentication is the

Q3

The objective of Availability is to make information accessible by protecting it from some but not all of these: (i) denial of service, (ii) fire, (iii) flood, (iv) unauthorized transaction, (v) unreadable backup tape. How many of these are excluded?

Q4

Which of the following couplings best defines risk?

Q1

Access control means

Q2

The security goal Accountability lies outside the ordinary C-I-A triad, but it is reasonable to say that Accountability is close to the combination of Authenticity with

Q3

Assume "S." stands for "Security", and count how many of the following 7 terms mean roughly the same as S. control in the field of information security: S. mechanism, S. model, S. policy, S. service, protection, countermeasure, safeguard.

Q4

The strategy of forming layers of protection around an asset or facility is known as

Q5

Non-repudiation as a security objective means that

Q6

Non-repudiation is

Q1

Which counts as two factor authentication?

Q2

What is the term used for such collections of data that a person can use to prove his or her identity?

Q3

Decisions on who can access certain data, like documents or databases, are best made by

Q4

Shared secret is an InfoSec term that usually refers to

Q1

One of the tasks of a certification authority is

Q2

Challenge-response is a protocol between two parties A and B such that

Q3

A digital signature is made with

Q4

At what phase of a product's life cycle is it likely to be most expensive to improve security?

Q5

What does a firewall prevent from functioning in the way they were intended to?

Q6

What security concept is violated by the following: One person in the finance department is able to insert vendors to the vendor database and subsequently pay to the vendors?

Q7

Steganography is

Q1

Which of the following statements is true?

Q2

It is important to have an off-site backup copy of files to

Q3

All of the following may be needed to repair broken integrity, but what is the most concrete concept?

Q4

If you are a EU citizen and your personal data has been unduly disclosed by a service in EU,

Q1

The central meaning of data protection is in protecting

Q2

GDPR defines several roles with respect to a person's personal data, but not the role of data

Q3

The European Union has enacted General Data Protection Regulation that mainly covers

Q4

Payment card industry data security standard, PCI-DSS

Q1

When studying anonymity as a security goal it is natural to define it to have different degrees depending on

Q2

Privacy is synonymous to

Q3

Pseudonym is

Q1

Copyright is originally a property of

Q2

One purpose of DRM is

Q3

What is not a way to protect intellectual property?

Q1

When you craft a job application you can include links to your social media postings. What can go wrong, in the sense of information security?

Q2

Social media is in constant motion and update is a buzzword there. What kind of update, however, is poorly taken care of - if at all?

Q3

Social media is a "lively place" and update is a buzzword there. What kind of update, however, is usually poorly handled?

Q4

Who is responsible if you share in social media something that is legal but not true and this causes harm to someone who reads it?

Q1

Ethics is an important topic in information systems,

Q2

What is not a topic of ethical considerations?

Q3

If you need to browse the internet anonymously,

Q1

Assume you have logged in to a web site with your registered username and password. Then you close your browser and switch off the computer. The next day you launch the browser and navigate to the same site. If you get directly logged in without entering any credentials, what can you infer?

Q2

Assume you buy a USB memory stick that has internal 256-bit AES encryption. The stick has a small keyboard (0..9) where you can choose a passcode of length 8, 9 or 10 key presses for accessing your data. You take the longest code into use, but then an attacker gets hold of our stick. He doesn't try to press the keys, but opens the stick and can enter codes electronically. How many attempts does he have to make in the worst case (his worst, not yours)?

Q3

If your personal computer has a firewall, it is typically

Q4

There is a vast variety of things that can be connected to the USB port of a computer. Ignoring problems with electricity, which of the following connections has the least risks in information security?

Q1

What control mechanisms can be left out of the risk analysis?

Q2

Which of the following does not need to be considered in the risk analysis?

Q3

Compared to a previous estimate, the overall risk is reduced if

Q4

Alice has been tasked with implementing several security controls to protect the company's email system. This shows that the company's approach to email risks is

Q1

A non-disclosure agreement may have many forms, but its usual purpose is

Q2

The basic goal of a public key infrastructure is to

Q3

Assume K is a public key and S is the corresponding private key, and they belong to person B. A certificate for K is generated when

Q1

If you need to come up with a question and answer in a web service for the case of forgetting your password, which of the following is most important from the authentication point of view?

Q2

If your browser offers you the option to save for future use the password you just entered for some web service, which of the following conditions is most important for you to accept the offer?

Q3

The instructions concerning the use of a password can be condensed into five prohibitions: Do not (i) show, (ii) tell, (iii) save, (iv) allow to age, (v) recycle. In the case of a personal password, you must not bargain on some points, whereas you can do it on others. Which of the following mentions first a prohibition that you must not and then one that you can relax?

Q4

Which of the following is generally the most dangerous with passwords? The user

Q5

It has been said of the password that it should be treated like your own toothbrush. How many of the following password-related features does this statement represent? (i) Entropy, (ii) usability, (iii) keeping it for personal use only, (iv) changing it often enough.

Q1

With the exception of the cookie itself or other cookies, a web browsing cookie cannot break

Q2

In the original and still most common usage, the web browsing cookie is created by the

Q3

The purpose of a web browsing cookie is to transmit to the web server information

Q1

CAPTCHA or "Completely Automated Public Turing test to tell Computers and Humans Apart"

Q2

Why would you bother to write your email address in the form of john.doePOISTA@MINUTtuni.fi? ("Poista minut" is Finnish for "Remove me".)

Q1

Cryptographic primitives are mainly

Q2

Which of the following is mainly a task that can be performed using a cryptographic protocol?

Q3

Investigate the argument: Crypto algorithms are either symmetric encryption algorithms, or asymmetric encryption or signature algorithms. It is

Q4

Which of the following is not covered by the concept of a cryptographic algorithm?

Q5

An implementation of ____ that contains all the necessary software, protocols, algorithms and keys, is called ______ .

Q6

The term plaintext

Q1

There are two classes of symmetric cryptographic methods, the _____ ciphers process the plaintext a fixed number of bits (e.g. 128) at a time and the _____ ciphers proceed bit by bit.

Q2

Encryption is a method for protecting confidentiality of data, and it requires a key, that

Q3

As a result of doubling the length of a symmetric encryption key, the time required for a brute force attack, if originally T, becomes

Q4

Stream ciphers are one of the two classes of symmetric cryptographic methods, the other one being

Q1

The most popular symmetric cryptosystem currently is

Q2

DES, the Digital Encryption Standard, was for a long time the state-of-the-art method to

Q3

What is a one-time pad?

Q4

AES is a

Q1

A public key for ______ is a cryptographic analogue of a physical key available to anyone that can be used to shut a padlock on a box in such a way that it can only be opened with a different key.

Q2

A public key for ______ is a cryptographic analogue of a physical key available to anyone that can be used to open a padlock on a box after someone has locked it with a different private key.

Q3

Which of the following does not apply?

Q4

Which of the following does not apply?

Q1

Which of the following is typical of checksums intended to prevent typing errors in the input of character strings that mainly contain digits?

Q2

The cryptographic hash value calculated from a message represents the entire message in the sense that

Q3

How does a cryptographic hash value protect a message?

Q4

Which of the following does not apply to keyed cryptographic hashes?

Q5

Assume H is a good cryptographic hash function. How many bit strings m of length 100 are there approximately that give an H(m) that starts with 40 zeros?

Q6

Assume H is a good cryptographic hash function. How many bit strings m of length 40 are there approximately that give an H(m) that starts with 100 zeros?

Q1

IPsec

Q2

What does key exchange mean in the sentence: "Key exchange is one of the most important cryptographic protocols."?

Q3

The protocol and program of choice for setting up a window for command line use of a remote computer is called

Q4

TLS is a very common cryptographic protocol. The T in its name comes from the word

Q1

What is true about fires?

Q2

The digital cash bits on a smart card cannot be extracted from the card and copied for reuse. Only one of the following is a reasonable, though partial, explanation. Which?

Q1

A demilitarized zone, DMZ, means a part of an organization's network that

Q2

Which of the following should mainly be able to filter packets like a dedicated firewall machine does?

Q3

Which of the following can a packet filter do: (i) anti-virus, (ii) delete oversized email attachments, (iii) encrypt or decrypt?

Q4

How does a packet filter react to TCP and UDP port numbers?

Q5

The tasks of a packet filter may include

Q1

One possible action of IPsec is to add to each data packet a field with

Q2

IPsec encrypts data packets on a protocol layer that is

Q3

If a remote user's machine fails to authenticate the target machine, it may be a wrong one and all of the following are potential threats. Which one is the most serious? The target machine can

Q4

Because TLS works below the application layer, it

Q5

Which of the following is more important in a VPN that must meet the security needs of the network connection for a remote worker?

Q1

In the cell phone system the network authenticates the phone or actually the SIM card in it. What mechanism is in place here?

Q2

The mobile phone systems 2G, 3G, 4G, ... authenticate the subscriber

Q3

What is the relation between WiFi, WLAN, VLAN and WPA?

Q4

WPA is a cryptographic protocol for protecting wireless communications. Which of the following: (i) NFC, (ii) ZigBee, (iii) Bluetooth, (iv) WiFi?

Q1

What is not used as a term for the act of a computer system making a new entry to the log file of active users?

Q2

Login is an exceptional program in the sense that

Q3

Regardless of which programs you are running on your computer the most essential protections for your computing is provided by

Q4

Sandboxing is a security mechanism, where

Q5

Single sign-on

Q6

Single sign-on is characterized by the fact that

Q1

A database is an organized collection of data. The organization usually means delicate dependencies between parts of that collection, and this is a main reason for specific security requirements for databases. More than the other options, such requirements concern

Q2

Why do you sometimes need to write zeros and ones over and over again on a file on disk?

Q3

Password salt is