Data Mining
Activity 3
½ crosswise/ DIRECT ANSWER
Identification Exam: Information Assurance & Security
Instructions: Identify the correct term for each of the following definitions or descriptions.
Write your answers clearly.
1. The property that ensures information is not disclosed to unauthorized individuals,
entities, or processes.
2. The principle that guarantees information remains accurate and unaltered during
storage, transmission, and processing.
3. The assurance that authorized users have timely and reliable access to information
and resources.
4. A security model represented as a three-dimensional cube, addressing the
relationships between security goals, information states, and safeguards.
5. The process of converting plaintext into unreadable text to prevent unauthorized
access.
6. A type of attack where the perpetrator intercepts and potentially alters the
communication between two parties without their knowledge.
7. A security measure that restricts access to resources based on the identity of users
or systems.
8. A form of malware that replicates itself by inserting copies into other computer
programs or files.
9. A security principle that ensures an individual cannot deny having performed a
particular action.
10. An attack that aims to make a machine or network resource unavailable to its
intended users by overwhelming it with a flood of requests.
11. The process of verifying the identity of a user, system, or entity before granting
access.
12. A malicious program that appears legitimate but can take control of a user's system.
13. A security approach that involves implementing multiple layers of security controls
throughout an information system.
14. The practice of assessing and mitigating potential threats and vulnerabilities to
reduce the impact of security incidents.
15. A type of attack where the attacker deceives individuals into revealing confidential
information by pretending to be a trustworthy entity.
True or False
Instruction: Read the questions carefully. Identify whether the statement is true
write T or if false write F.
16. ___ Data exploration is the initial step in data analysis, where the data is summarized
and visualized to understand its structure and patterns.
17. ___ A box plot displays the median, quartiles, and possible outliers in the data.
18. ___ Correlation is a measure used to determine the causality between two variables.
19. ___ A histogram is best used for categorical variables.
20. ___ Standard deviation measures the central tendency of a dataset.
21. ___ Scatter plots are useful for identifying relationships between two numerical
variables.
22. ___ The presence of outliers can significantly affect the mean of a dataset.
23. ___ Skewness measures the symmetry of a distribution.
24. ___ A perfectly symmetrical distribution has a skewness of zero.
25. ___ The mode is the most frequently occurring value in a dataset.
26. ___ Data visualization is not necessary if summary statistics are already provided.
27. ___ The range is calculated as the difference between the maximum and minimum
values.
28. ___ A negatively skewed distribution has a longer tail on the right side.
29. ___ Missing values in a dataset always need to be removed before analysis.
30. ___ Data normalization changes the range of data without distorting differences in the
ranges of values.
31. ___ The interquartile range (IQR) includes the middle 50% of the data.
32. ___ A correlation coefficient of -1 implies no relationship between the variables.
33. ___ Outliers are data points that lie far from the rest of the data.
34. ___ The mean is always equal to the median in a skewed distribution.
35. ___ Visualization techniques help in detecting patterns, trends, and outliers in data.