Week 1 – Understanding Security Threats

it security defense against the digital dark arts week 1 answers

Malicious Software

1. In the CIA Triad, "Confidentiality" means ensuring that data is:

  • accurate and was not tampered with.
  • available and that people can access it.
  • not accessible by unwanted parties.
  • accessible anonymously.

2. In the CIA Triad, "Integrity" means ensuring that data is:

  • available and that people can access it.
  • truthful and honest.
  • accurate and was not tampered with.
  • not accessible by unwanted parties.

3. In the CIA Triad, "Availability" means ensuring that data is:

  • available to anyone from anywhere.
  • available and people can access it.
  • not accessible by unwanted parties.
  • accurate and was not tampered with.

4. What's the relationship between a vulnerability and an exploit?

  • An exploit creates a vulnerability in a system.
  • An exploit takes advantage of a vulnerability to run arbitrary code or gain access.
  • They’re unrelated.
  • A vulnerability takes advantage of an exploit to run arbitrary code or gain access.

5. Which statement is true for both a worm and a virus?

  • They infect other files with malicious code.
  • They’re self-replicating and self-propagating.
  • They don’t cause any harm to the target system.
  • They’re undetectable by antimalware software.

6. Check all examples of types of malware:

  • Adware
  • Viruses
  • Worms
  • Key Generators

7. What are the characteristics of a rootkit? Check all that apply.

  • Is harmless
  • Is difficult to detect
  • Is destructive
  • Provides elevated credentials

Devendra Kumar

Project Management Apprentice at Google

Leave a Reply