Computer Security – SEE Computer Science – Grade X [New Course] #2076B.S. #Solved Objectives of Asia Publications
1.
Fill
in the blanks:
b) Confidentiality
refers to protecting information from disclosure.
c) Computer
Emergency Response Team (CERT) has defined threats
as “any circumstances or events
that have potential to cause harm to a
system or a network.”
d) A
firewall is a system design
to prevent unauthorized access to or from a private network.
e) Antivirus software
is a program designed to detect and remove viruses from the computer system.
Set
2
a) Hardware security
protects the machine and peripheral hardware from theft, electronic, intrusion
and damage.
b) The
temperature in the computer system should be maintained between 210C to 240C.
c) Security
lighting and closed-circuit television cameras are the methods of hardware protection.
d) UPS
is a device that allows your computer to keep running for at least a short time
when the primary
power source is lost.
e) Voltage regulator
is a device or circuit that maintains a load voltage nearly constant over a
range of
variations of input voltage and load
current.
2.
Tick the correct response and correct the wrong one:
Set
1
a) Security
attacks comprise all actions that breaches the computer security. True
b) Information
Security programs are build around 3 objectives, commonly known as CIA
(Confidentiality, Integrity, Availability).
True
c) Availability
refers to ensuring that the data or information is not corrupted or modified by
unauthorized users. False
d) Firewalls
prevent unauthorized internet users from accessing private networks connected
to the
internet, especially intranets. True
e) The
encrypted information is called plain text. False
Set
2
a) Routine
servicing of hardware is a must to keep equipment in good operating condition
and to find and correct problems before they develop into severe malfunctions. True
b) The
temperature in the computer system should be maintained between 31°C to 34°C. False
c) Computer
equipment should be used and stored at a relative humidity of 50 percent with 5
percent variation. True
d) Security
lighting and closed-circuit television cameras are the methods of software
protection. False
e) A
computer requires a constant source of electrical power. True
3. Write the technical terms for
the following statements:
Set
1
a) The
practice of preventing unauthorized access, use, disclosure, disruption,
disruption, modification, inspection, recording or destruction of information. Information security
b) A
set of rules designed to enhance computer security by encouraging users to
employ strong passwords and use them properly. Password policy
c) The
process of identifying individuals for authentication. Biometric
d) A
system designed to prevent unauthorized access to or form a private network. Firewall
e) The
process of converting ordinary plain text into unintelligible text and
vice-versa. Cryptography
Set
2
a) A
program designed to detect and remove viruses from the computer system. Antivirus software
b) A
type of security that protects the machine and peripheral hardware from theft,
electronic intrusion and damage. Hardware
security
c) A
device that allows your computer to keep running for at least a short time when
the primary power source is lost. UPS
d) A
device or circuit that maintains a load voltage nearly constant over a range of
variations of input voltage and load current. Voltage regulator
e) A
device that shields computer and other electronic devices from surges in
electrical power, or transient voltage, that flow from the power supply. Surge suppressor
4. Give the full forms
of the following abbreviations:
a) CIA
– Confidentiality, Integrity, Availability
b) CERT-
Computer Emergency Response Team
c) UPS
– Uninterruptible Power Supply
5. Select the
best answer from the list of choices. [MCQ]
Set-1
a.
The
................... threats arise from hackers who intrude into systems posing
as authorized users.
i. |
Authorization |
ii. |
Application |
iii. |
Physical
security |
iv. |
All
of the above |
b.
...............is a method of storing
and transmitting data in a particular form so that only those for it is
intended can resd and process it.
i. |
Firewall |
ii. |
Biometrics |
iii. |
Cryptography |
iv. |
All
of the above |
c.
....................... protect the
machine and peripheral hardware from theft, electronic intrusion and damage.
i. |
Information
security |
ii. |
Hardware
security |
iii. |
Software
security |
iv. |
None
of the above |
Set-2
a. Some
of the methods of hardware protetion are ...................
i. |
Fire
Alarms |
ii. |
Security
lighting |
iii. |
Closed-circuit cameras |
iv. |
All of the above |
b. The
temperature in the computer system should be maintained between
.................to............................
i. |
210C
and 240C |
ii. |
200C
and 250C |
iii. |
230C
and 280C |
iv. |
None
of the above |
c. ........................
is a device that protect your PC against power surges and spikes.
i. |
UPS |
ii. |
Voltage
regulator |
iii. |
Surge suppressor |
iv. |
All
of the above |
6.
Match the following:
a)
Information security |
c) The process
of preventing and detecting
unauthorized use of your computer |
b)
Biometrics |
a) The practice
of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction
of information. |
c)
Computer security |
b) The process
of identifying individuals for authentication. |
d)
Cryptography |
e) A system designed
to prevent unauthorized access to or from a private network. |
e)
Firewall |
d) The process
of converting ordinary plain text into unintelligible text and vice-versa. |
Thank you sir, I really appreciate your efforts.
ReplyDelete