Thursday, September 3, 2020

Computer Security – SEE Computer Science – Grade X [New Course] #2076B.S. #Solved Objectives of Asia Publications

 Computer Security – SEE Computer Science – Grade X [New Course] #2076B.S. #Solved Objectives of Asia Publications



1.               Fill in the blanks:

 Set 1

 a)     Computer Security is the process of preventing and detecting unauthorized use of your computer.

b)     Confidentiality refers to protecting information from disclosure.

c)     Computer Emergency Response Team (CERT) has defined threats as “any circumstances or events

that have potential to cause harm to a system or a network.”

d)     A firewall is a system design to prevent unauthorized access to or from a private network.

e)     Antivirus software is a program designed to detect and remove viruses from the computer system.

 

Set 2

 

a)     Hardware security protects the machine and peripheral hardware from theft, electronic, intrusion

and damage.

b)     The temperature in the computer system should be maintained between 210C to 240C.

c)     Security lighting and closed-circuit television cameras are the methods of hardware protection.

d)     UPS is a device that allows your computer to keep running for at least a short time when the primary

power source is lost.

e)     Voltage regulator is a device or circuit that maintains a load voltage nearly constant over a range of

variations of input voltage and load current.

 

 

2. Tick the correct response and correct the wrong one:

 

Set 1

 

a)     Security attacks comprise all actions that breaches the computer security. True

b)     Information Security programs are build around 3 objectives, commonly known as  CIA

(Confidentiality, Integrity, Availability). True

c)     Availability refers to ensuring that the data or information is not corrupted or modified by

unauthorized users. False

d)     Firewalls prevent unauthorized internet users from accessing private networks connected to the

internet, especially intranets. True

e)     The encrypted information is called plain text. False

 

Set  2

 

a)     Routine servicing of hardware is a must to keep equipment in good operating condition and to find and correct problems before they develop into severe malfunctions. True

b)     The temperature in the computer system should be maintained between 31°C to 34°C. False

c)     Computer equipment should be used and stored at a relative humidity of 50 percent with 5 percent variation. True

d)     Security lighting and closed-circuit television cameras are the methods of software protection. False

e)     A computer requires a constant source of electrical power.  True

 


 

3. Write the technical terms for the following statements:

 

Set  1

 

a)     The practice of preventing unauthorized access, use, disclosure, disruption, disruption, modification, inspection, recording or destruction of information. Information security

b)     A set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly. Password policy

c)     The process of identifying individuals for authentication. Biometric

d)     A system designed to prevent unauthorized access to or form a private network. Firewall

e)     The process of converting ordinary plain text into unintelligible text and vice-versa. Cryptography

 

Set  2

 

a)     A program designed to detect and remove viruses from the computer system. Antivirus software

b)     A type of security that protects the machine and peripheral hardware from theft, electronic intrusion and damage. Hardware security

c)     A device that allows your computer to keep running for at least a short time when the primary power source is lost. UPS

d)     A device or circuit that maintains a load voltage nearly constant over a range of variations of input voltage and load current. Voltage regulator

e)     A device that shields computer and other electronic devices from surges in electrical power, or transient voltage, that flow from the power supply. Surge suppressor

 

4. Give the full forms of the following abbreviations:

a)     CIA – Confidentiality, Integrity, Availability

b)     CERT- Computer Emergency Response Team

c)     UPS – Uninterruptible Power Supply

 

5. Select the best answer from the list of choices. [MCQ]

 

            Set-1

 

a.      The ................... threats arise from hackers who intrude into systems posing as authorized users.

i.

Authorization

ii.

Application

iii.

Physical security

iv.

All of the above

b.     ...............is a method of storing and transmitting data in a particular form so that only those for it is intended can resd and process it.

i.

Firewall

ii.

Biometrics

iii.

Cryptography

iv.

All of the above

c.      ....................... protect the machine and peripheral hardware from theft, electronic intrusion and damage.

i.

Information security

ii.

Hardware security

iii.

Software security

iv.

None of the above

 

                    Set-2

 

a.      Some of the methods of hardware protetion are ...................

i.

Fire Alarms

ii.

Security lighting

iii.

Closed-circuit cameras

iv.

All  of the above

b.     The temperature in the computer system should be maintained between .................to............................

i.

210C and 240C

ii.

200C and 250C

iii.

230C and 280C

iv.

None of the above

c.      ........................ is a device that protect your PC against power surges and spikes.

i.

UPS

ii.

Voltage regulator

iii.

Surge suppressor

iv.

All  of the above

 

6. Match the following:

 

a)     Information security

c) The process of preventing and  detecting unauthorized use of your computer

b)     Biometrics

a) The practice of preventing unauthorized access, use, disclosure, disruption,  modification, inspection, recording or destruction of information.

c)     Computer security

b) The process of identifying individuals for authentication.

d)     Cryptography

e) A system designed to prevent unauthorized access to or from a private network.

e)     Firewall

d) The process of converting ordinary plain text into unintelligible text and vice-versa.

 

 #ThankYou Bandana Khadka, Shreyasha Dhakal and Aadesh Rai for Typing support

 

 

 

                                                                           

           

 

 

1 comment: