Because
attackers break into systems for various reasons, it is important for
information security professionals to understand how malicious hackers exploit
systems and the probable reasons behind the attacks.
A
True
B
False     Correct Ans  -   A
Information
security refers to ________ or ________ information and information systems
that use, store, and transmit information from unauthorized access, disclosure,
alteration, and destruction.
A
compiling / securing
B
imaging / shielding
C
duplicating / saving
D
protecting / safeguarding     Correct
Ans  -  Â
D
Information
is not the critical asset that organizations need to secure.
A
False
B
True     Correct Ans  -   A
________
is the part of a malware or an exploit that performs the intended malicious
actions, which can include creating backdoor access to a victim's machine,
damaging or deleting files, and data theft.
A
Payload
B
Vulnerability
C
Exploit
D
Hack value     Correct Ans  -   A
In
a ________, the attacker exploits vulnerabilities in a computer application
before the software developer can release a patch for them.
A
payload
B
zero-day attack
C
hack value
D
vulnerability     Correct Ans  -   B
Information
security is defined as "a state of well-being of information and
infrastructure in which the possibility of theft, tampering, and disruption of
information and services is kept low and tolerable."
A
False
B
True     Correct Ans  -   B