Thursday, January 27, 2011

CS507 Current Quiz

Question # 1 of 10 ( Start time: 07:58:13 PM ) Total Marks: 1
Management controls are also known as:
Select correct option:

Technical controls
Non-technical controls
Scientific controls
Logical controls



Question # 2 of 10 ( Start time: 07:59:49 PM ) Total Marks: 1
Bug is caused by improper application of programming logic.
Select correct option:

True
False


3 of 10 ( Start time: 08:00:34 PM ) Total Marks: 1
Dropper is an example of Trojans
Select correct option:

True
False


Question # 4 of 10 ( Start time: 08:01:50 PM ) Total Marks: 1
Measuring technical assessment of a computing system is known as:
Select correct option:

security plan
security measures
security audit
security lapse


Question # 5 of 10 ( Start time: 08:02:42 PM ) Total Marks: 1
Access control helps user to establish identity
Select correct option:

True
False



Question # 6 of 10 ( Start time: 08:03:44 PM ) Total Marks: 1
Bug is an internal malfunction of the software.
Select correct option:

True
False

Question # 7 of 10 ( Start time: 08:04:19 PM ) Total Marks: 1
The out put of Threat Identification phase is a threat statement identifying and defining threats.
Select correct option:

True
False

Question # 8 of 10 ( Start time: 08:05:12 PM ) Total Marks: 1
Traversing of a record of every keystroke, often called
Select correct option:

Physical Key Monitoring
Logical Key Monitoring
Keystroke Monitoring
Primary Key Monitoring

Question # 9 of 10 ( Start time: 08:05:55 PM ) Total Marks: 1
Software that is developed through OOAD is easy to test due to the use of _________.
Select correct option:

Real time modeling
Usability features
Modular approach
Procedural approach

Question # 10 of 10 ( Start time: 08:06:37 PM ) Total Marks: 1
Cryptography primarily consists of Two basic processes.
Select correct option:

True
False





Question # 1 of 10 ( Start time: 08:09:42 PM ) Total Marks: 1
Which of the following phase determines the adverse impact resulting from a successful threat exercise of vulnerability?
Select correct option:
Risk resilience
Monitoring threats
Likelihood determination
Impact analysis





Question # 2 of 10 ( Start time: 08:10:36 PM ) Total Marks: 1
Which of the following assigns overall responsibility for the security of information?
Select correct option:
Security Professionals
Executive Management
Data Owners
Option a and b


Question # 3 of 10 ( Start time: 08:11:54 PM ) Total Marks: 1
In the context of information security, data cannot be modified without authorization is known as _______.
Select correct option:
user’s rights
privileges
integrity
privacy





Question # 4 of 10 ( Start time: 08:13:00 PM ) Total Marks: 1
_______ refer to the sudden increase in power supply.
Select correct option:
Sags
Brown outs
Spikes
Black out




Question # 5 of 10 ( Start time: 08:14:03 PM ) Total Marks: 1
_______ has no way to replicate automatically
Select correct option:
Virus
Worm
Bug
Trojan horse



Question # 6 of 10 ( Start time: 08:15:23 PM ) Total Marks: 1
Which one of the following is not classified as biometrics?
Select correct option:
Digital Password
Sound of your voice
Blood vessels in the retina of your eye
Finger Prints


Question # 7 of 10 ( Start time: 08:16:05 PM ) Total Marks: 1
There are typically ______________ kinds of audit records
Select correct option:
Three
Four
Five
Two

Question # 8 of 10 ( Start time: 08:17:24 PM ) Total Marks: 1
We have to secure our systems in such fashion that possibilities of having bugs are reduced
Select correct option:
True
False


Question # 9 of 10 ( Start time: 08:18:54 PM ) Total Marks: 1
Information elicitation can be achieved via
Select correct option:
HR department
Press release
Corporate level facilitator
On site interviews


Which of the following controls have gained critical importance in the modern computing age for two significant reasons.
Select correct option:
Access
Communication
Data Base
Output





  

No comments:

Post a Comment