IS4 PM_2025 – Telegram
IS4 PM_2025
736 subscribers
724 photos
47 videos
1.15K files
308 links
Download Telegram
private key in asymmetric key cryptographic is kept by receiver
Anonymous Quiz
93%
True
7%
False
Virus requires a user to transport it from one computer to another
Anonymous Quiz
93%
True
7%
False
threat is a potential danger to information or system
Anonymous Quiz
93%
True
7%
False
Push flood is not a DOS attack
Anonymous Quiz
70%
True
30%
False
Firewall are used to protect against unauthorized access
Anonymous Quiz
91%
True
9%
False
Conventional cryptography also known as Asymmetric encryption
Anonymous Quiz
71%
True
29%
False
A private key in Asymmetric key cryptography is kept by receiver
Anonymous Quiz
92%
True
8%
False
A private key in Asymmetric key cryptography is kept by sender
Anonymous Quiz
34%
True
66%
False
Each of the following is a reason it is difficult to defend against today’s attackers except ……….. .
Anonymous Quiz
58%
complexity of attack tools
18%
weak patch distribution
7%
greater sophistication of attacks
17%
delays in patching software products
By definition, a(n) ……… is a person or thing that has the power to carry out a threat. .
Anonymous Quiz
12%
vulnerability
14%
exploit
69%
threat agent
5%
risk
The ……….. requires that enterprises must guard protected health information and implement
policies and procedures to safeguard it.
Anonymous Quiz
44%
Hospital Protection and Insurance Association Agreement (HPIAA)
7%
Sarbanes-Oxley Act (Sarbox)
8%
Gramm-Leach-Bliley Act (GLBA)
41%
Health Insurance Portability and Accountability Act (HIPAA)
An organization that purchased security products from different vendors is demonstrating
which security principle?
Anonymous Quiz
57%
diversity
13%
limiting
25%
obscurity
5%
layering
Each of the following can be classified as an “insider” except …….. .
Anonymous Quiz
8%
business partners
15%
employees
3%
contractors
73%
cybercriminals
An example of a(n) ………….. is a software defect in an operating system that allows an
unauthorized user to gain access to a computer without a password.
Anonymous Quiz
16%
threat agent
10%
threat
62%
vulnerability
11%
asset exploit (AE)
A ……………. requires a user to transport it from one computer to another.
Anonymous Quiz
11%
worm
10%
rootkit
76%
virus
3%
Trojan
IS4 PM_2025
Conventional cryptography also known as asymmetric encryption ?
الإجابة الصحيحة false
🤣3
تعميم لمستوى ثالث


نظرا لأن امتحان الأمنية لمستوى ثالث كان مقرر غدا في الفترة الأخيرة من الساعة 4 الى 5:30 حيث أنه وفي الساعة 5:30 يكون وقت اذان المغرب ، لذلك فقد تم تأجيل اختبار امنية الحاسوب لمستوى ثالث الى يوم الخميس الساعة 2 الموافق
16/نوفمبر/2023
💔96
توضيح بشأن السؤال
The term hacker is sometimes used to identify anyone who illegally breaks into a computer system

حيث السؤال كان قد ورد في الإختبار النصفي والدكتور اعتمد الإجابة
False
👍2👌1
IS4 PM_2025
Conventional cryptography also known as asymmetric encryption ?
Conventional cryptography also known as symmetric encryption?


True
💔2
اختبارات غدوة ع تكون كذا ماتدري انك تختار على مافي الكتاب ولا على مافي راس الدكتور 😅💔
🤣15