7408 TCS Answers : iSecurity quiz

iSecurity quiz for 7408 TCS Answers, offering detailed answers to questions across various sections. In the realm of Information Security Basics, the discussion covers the definition of information security.This article provides the answers to the iSecurity quiz for 7408 TCS Answers. The questions and answers are listed below with headings for each section.
7408 TCS Answers
7408 TCS Answers

 

More Answers in PDF: Visit Now

7408 TCS Answers : iSecurity quiz

Section 1: Information Security Basics 7408 TCS Answers

Question 1

What is information security?
  • Information security is the practice of protecting information by mitigating risks to the confidentiality, integrity and availability of information.

Question 2

What are the three main components of information security?
  • Confidentiality, Integrity and Availability (CIA triad)

Section 2: Security Threats and Risks 7408 TCS Answers

Question 1

What are the main types of security threats?
  • Malware, hacking, social engineering, physical threats, natural disasters
TCS Course Answers all :
TCS RIO : Remote Internship

My Youtube channel

56978 TCS Answers : Agile E1
43893 TCS Answers : Information Security Awareness
7408 TCS Answers : iSecurity quiz
21939 TCS Answers : TCS Code of Conduct
64091 TCS Answers : Mastering TCS Data Privacy
55220 TCS Answers : Navigating Success GDPR
62297 TCS Answers : TCS SBWS Mode Assessment
2735 TCS Answers : Sexual Harassment Success

Question 2

What is a security risk?
  • A security risk is any potential vulnerability that could be exploited by a threat to cause harm. It is measured in terms of impact and likelihood.

Section 3: Security Policies and Procedures 7408 TCS Answers

Question 1

What is a security policy?
  • A security policy is a document that outlines an organization’s security rules and procedures. It establishes how security measures will be implemented and enforced.

Question 2

What are examples of security procedures?
  • Password policies, access control procedures, data classification and handling procedures, incident response procedures, change management procedures.

Section 4: Access Controls 7408 TCS Answers

Question 1

What are the main types of access controls?
  • Physical access controls, logical access controls, administrative access controls

Question 2

What is two factor authentication?
  • Two factor authentication requires two independent credentials for authentication – typically something you know (password) and something you have (token/phone). This provides stronger authentication than single-factor username/password.

Section 5: Malware and Cyber Attacks 7408 TCS Answers

Question 1

What is malware?
  • Malware is malicious software designed to damage or disrupt a system. Common types include viruses, worms, Trojans, and ransomware.

Question 2

What is a DDoS attack?
  • A DDoS (distributed denial of service) attack is a malicious attempt to disrupt normal traffic by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

Section 6: Network Security 7408 TCS Answers

Question 1

What is a firewall?
  • A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

Question 2

What is a VPN?
  • A VPN (virtual private network) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

Section 7: Cryptography 7408 TCS Answers

Question 1

What is cryptography?
  • Cryptography is the practice and study of techniques for secure communication in the presence of third parties called adversaries.

Question 2

What are the main types of cryptography?
  • Symmetric encryption (same key for encryption and decryption), Asymmetric encryption (public/private key pair), Hashing (one-way encryption to verify integrity)

Section 8: Operating Systems Security 7408 TCS Answers

Question 1

What is a vulnerability?
  • A vulnerability is a weakness which can be exploited by a threat to breach security and cause harm. Examples include bugs, design flaws, configuration issues.

Question 2

What is patching and why is it important?
  • Patching involves installing software fixes and security updates to address vulnerabilities. It is important to patch regularly as unpatched vulnerabilities can be exploited by attackers.

Section 9: Application Security 7408 TCS Answers

Question 1

What is SQL injection?
  • SQL injection is a code injection technique used to attack data-driven applications by inserting malicious SQL statements into input fields to run unintended commands.

Question 2

What is cross site scripting (XSS)?
  • XSS enables attackers to inject client-side scripts into web pages viewed by other users. This occurs when an application takes input from a user and sends it to a web browser without validation or escaping.

Section 10: Business Continuity and Disaster Recovery

Question 1

What is business continuity?
  • Business continuity involves maintaining operations during and after disruptive incidents like outages, disasters or cyber attacks to minimize financial and reputational impact.

Question 2

What is disaster recovery?
  • Disaster recovery refers to the people, policies, procedures and infrastructure involved in restoring IT systems, applications and data after a disaster or outage to resume critical business functions.

Section 11: Security Awareness and Training 7408 TCS Answers

Question 1

Why is security awareness important?
  • Security awareness educates users on threats, vulnerabilities and security best practices. This helps users spot social engineering attempts and make better security decisions to reduce human errors and vulnerabilities.

Question 2

What are the goals of security training?
  • The goals of security training are to ensure all personnel understand security policies and procedures, can identify security risks and incidents, and know how to appropriately respond to minimize damage from security events.

Leave a Comment