Question # 1 of 10 ( Start time: 07:58:13 PM ) Total Marks: 1
Management controls are also known as:
Select correct option:
Technical controls
Non-technical controls
Scientific controls
Logical controls
Question # 2 of 10 ( Start time: 07:59:49 PM ) Total Marks: 1
Bug is caused by improper application of programming logic.
Select correct option:
True
False
3 of 10 ( Start time: 08:00:34 PM ) Total Marks: 1
Dropper is an example of Trojans
Select correct option:
True
False
Question # 4 of 10 ( Start time: 08:01:50 PM ) Total Marks: 1
Measuring technical assessment of a computing system is known as:
Select correct option:
security plan
security measures
security audit
security lapse
Question # 5 of 10 ( Start time: 08:02:42 PM ) Total Marks: 1
Access control helps user to establish identity
Select correct option:
True
False
Question # 6 of 10 ( Start time: 08:03:44 PM ) Total Marks: 1
Bug is an internal malfunction of the software.
Select correct option:
True
False
Question # 7 of 10 ( Start time: 08:04:19 PM ) Total Marks: 1
The out put of Threat Identification phase is a threat statement identifying and defining threats.
Select correct option:
True
False
Question # 8 of 10 ( Start time: 08:05:12 PM ) Total Marks: 1
Traversing of a record of every keystroke, often called
Select correct option:
Physical Key Monitoring
Logical Key Monitoring
Keystroke Monitoring
Primary Key Monitoring
Question # 9 of 10 ( Start time: 08:05:55 PM ) Total Marks: 1
Software that is developed through OOAD is easy to test due to the use of _________.
Select correct option:
Real time modeling
Usability features
Modular approach
Procedural approach
Question # 10 of 10 ( Start time: 08:06:37 PM ) Total Marks: 1
Cryptography primarily consists of Two basic processes.
Select correct option:
True
False
Question # 1 of 10 ( Start time: 08:09:42 PM ) Total Marks: 1
Which of the following phase determines the adverse impact resulting from a successful threat exercise of vulnerability?
Select correct option:
Risk resilience
Monitoring threats
Likelihood determination
Impact analysis
Question # 2 of 10 ( Start time: 08:10:36 PM ) Total Marks: 1
Which of the following assigns overall responsibility for the security of information?
Select correct option:
Security Professionals
Executive Management
Data Owners
Option a and b
Question # 3 of 10 ( Start time: 08:11:54 PM ) Total Marks: 1
In the context of information security, data cannot be modified without authorization is known as _______.
Select correct option:
user’s rights
privileges
integrity
privacy
Question # 4 of 10 ( Start time: 08:13:00 PM ) Total Marks: 1
_______ refer to the sudden increase in power supply.
Select correct option:
Sags
Brown outs
Spikes
Black out
Question # 5 of 10 ( Start time: 08:14:03 PM ) Total Marks: 1
_______ has no way to replicate automatically
Select correct option:
Virus
Worm
Bug
Trojan horse
Question # 6 of 10 ( Start time: 08:15:23 PM ) Total Marks: 1
Which one of the following is not classified as biometrics?
Select correct option:
Digital Password
Sound of your voice
Blood vessels in the retina of your eye
Finger Prints
Question # 7 of 10 ( Start time: 08:16:05 PM ) Total Marks: 1
There are typically ______________ kinds of audit records
Select correct option:
Three
Four
Five
Two
Question # 8 of 10 ( Start time: 08:17:24 PM ) Total Marks: 1
We have to secure our systems in such fashion that possibilities of having bugs are reduced
Select correct option:
True
False
Question # 9 of 10 ( Start time: 08:18:54 PM ) Total Marks: 1
Information elicitation can be achieved via
Select correct option:
HR department
Press release
Corporate level facilitator
On site interviews
Which of the following controls have gained critical importance in the modern computing age for two significant reasons.
Select correct option:
Access
Communication
Data Base
Output
Management controls are also known as:
Select correct option:
Technical controls
Non-technical controls
Scientific controls
Logical controls
Question # 2 of 10 ( Start time: 07:59:49 PM ) Total Marks: 1
Bug is caused by improper application of programming logic.
Select correct option:
True
False
3 of 10 ( Start time: 08:00:34 PM ) Total Marks: 1
Dropper is an example of Trojans
Select correct option:
True
False
Question # 4 of 10 ( Start time: 08:01:50 PM ) Total Marks: 1
Measuring technical assessment of a computing system is known as:
Select correct option:
security plan
security measures
security audit
security lapse
Question # 5 of 10 ( Start time: 08:02:42 PM ) Total Marks: 1
Access control helps user to establish identity
Select correct option:
True
False
Question # 6 of 10 ( Start time: 08:03:44 PM ) Total Marks: 1
Bug is an internal malfunction of the software.
Select correct option:
True
False
Question # 7 of 10 ( Start time: 08:04:19 PM ) Total Marks: 1
The out put of Threat Identification phase is a threat statement identifying and defining threats.
Select correct option:
True
False
Question # 8 of 10 ( Start time: 08:05:12 PM ) Total Marks: 1
Traversing of a record of every keystroke, often called
Select correct option:
Physical Key Monitoring
Logical Key Monitoring
Keystroke Monitoring
Primary Key Monitoring
Question # 9 of 10 ( Start time: 08:05:55 PM ) Total Marks: 1
Software that is developed through OOAD is easy to test due to the use of _________.
Select correct option:
Real time modeling
Usability features
Modular approach
Procedural approach
Question # 10 of 10 ( Start time: 08:06:37 PM ) Total Marks: 1
Cryptography primarily consists of Two basic processes.
Select correct option:
True
False
Question # 1 of 10 ( Start time: 08:09:42 PM ) Total Marks: 1
Which of the following phase determines the adverse impact resulting from a successful threat exercise of vulnerability?
Select correct option:
Risk resilience
Monitoring threats
Likelihood determination
Impact analysis
Question # 2 of 10 ( Start time: 08:10:36 PM ) Total Marks: 1
Which of the following assigns overall responsibility for the security of information?
Select correct option:
Security Professionals
Executive Management
Data Owners
Option a and b
Question # 3 of 10 ( Start time: 08:11:54 PM ) Total Marks: 1
In the context of information security, data cannot be modified without authorization is known as _______.
Select correct option:
user’s rights
privileges
integrity
privacy
Question # 4 of 10 ( Start time: 08:13:00 PM ) Total Marks: 1
_______ refer to the sudden increase in power supply.
Select correct option:
Sags
Brown outs
Spikes
Black out
Question # 5 of 10 ( Start time: 08:14:03 PM ) Total Marks: 1
_______ has no way to replicate automatically
Select correct option:
Virus
Worm
Bug
Trojan horse
Question # 6 of 10 ( Start time: 08:15:23 PM ) Total Marks: 1
Which one of the following is not classified as biometrics?
Select correct option:
Digital Password
Sound of your voice
Blood vessels in the retina of your eye
Finger Prints
Question # 7 of 10 ( Start time: 08:16:05 PM ) Total Marks: 1
There are typically ______________ kinds of audit records
Select correct option:
Three
Four
Five
Two
Question # 8 of 10 ( Start time: 08:17:24 PM ) Total Marks: 1
We have to secure our systems in such fashion that possibilities of having bugs are reduced
Select correct option:
True
False
Question # 9 of 10 ( Start time: 08:18:54 PM ) Total Marks: 1
Information elicitation can be achieved via
Select correct option:
HR department
Press release
Corporate level facilitator
On site interviews
Which of the following controls have gained critical importance in the modern computing age for two significant reasons.
Select correct option:
Access
Communication
Data Base
Output
No comments:
Post a Comment