Which of the following refers to the process of identifying attempts to penetrate a system and gain unauthorized access
Select correct option:
Intrusion Detection
Audit trial
Control Trial
Documentation
Question # 2 of 10
A person either Hacker or Hacktivist or cracker is actually an intruder.
Select correct option:
True
False
Question # 3 of 10
Which of the following is responsible for ensuring that appropriate security, consistent with the organization’s security policy, that is embedded in their information systems.
Select correct option:
Data Owners
Process Owners
Executive Management
Users
Question # 4 of 10
MIS uses duplication of components and data to cope with systems failures?
Select correct option:
True
False
Question # 5 of 10
Which of the following may attack executable programs?
Select correct option:
Viruses
Worms
Trojans
Sniffers
Question # 6 of 10
Dropper is an example of Trojans
Select correct option:
True
False
Question # 7 of 10
Sasser, Netsky, and Sobig are all classified as:
Select correct option:
DoS viruses
Worm viruses
Virus hoaxes
Trojan horses
Question # 8 of 10
Which of the following is a logical record of computer activities, usage, processing pertaining to an operating or application system or user activities.
Select correct option:
Audit Trial
Control Log
Control Trial
Audit Control
Question # 9 of 10
UPS stands for----------------------
Select correct option:
Un-interrupted power supplies
Un-eruptible power supplies
Uni-enterrupted power supplies
None of above options
Question # 10 of 10
The protection of information from unauthorized disclosure explains the concept of system and data ______________.
Select correct option:
Completeness
Consistency
Reliability
Confidentiality
Question # 1 of 10 ( Start time: 09:38:46 AM ) Total Marks: 1
After the process of risk assessment has been completed, the next process is that of risk ______________.
Select correct option:
Detection
Criticality analysis
Scrutiny
Mitigation
Question # 2 of 10 ( Start time: 09:40:09 AM ) Total Marks: 1
Intruder might try to remove hard disks is an example of Logical intrusion
Select correct option:
True
False
Question # 3 of 10 ( Start time: 09:41:32 AM ) Total Marks: 1
Which of the following refers to individuals using their skills to forward a political agenda, possibly breaking the law in the process, but justifying their actions for political reasons.
Select correct option:
Hacker
Intruder
Hacktivist
Cracker
Question # 4 of 10 ( Start time: 09:42:07 AM ) Total Marks: 1
Providing independent assurance to management regarding the appropriateness of the security objectives is the responsibility of _________.
Select correct option:
Information systems auditors
Data owners
Process owners
End users
Question # 5 of 10 ( Start time: 09:42:45 AM ) Total Marks: 1
Processing instructions carried out by theOperating system and application software should be monitored by implementation of controls.
Select correct option:
True
False
Question # 6 of 10 ( Start time: 09:43:29 AM ) Total Marks: 1
The protection of information from unauthorized disclosure explains the concept of system and data ______________.
Select correct option:
Completeness
Consistency
Reliability
Confidentiality
Question # 7 of 10 ( Start time: 09:44:13 AM ) Total Marks: 1
Traversing of a record of every keystroke, often called :
Select correct option:
Keystroke Monitoring
Logical Key Monitoring
Physical Key Monitoring
Primary Key Monitoring
Question # 8 of 10 ( Start time: 09:45:15 AM ) Total Marks: 1
Which of the following are normally skilled programmers, and have been known to crack system passwords, with quite an ease
Select correct option:
Hackers
Crackers
Hacktivists
Intruders
Question # 9 of 10 ( Start time: 09:45:49 AM ) Total Marks: 1
Which one of the following is not classified as biometrics?
Select correct option:
Digital Password
Sound of your voice
Blood vessels in the retina of your eye
Finger Prints
Question # 10 of 10 ( Start time: 09:46:49 AM ) Total Marks: 1
Which one of the following computer systems uses duplication of components and data to cope with systems failures?
Select correct option:
Fault-tolerant systems
EIS
MIS
OIS
After the process of risk assessment has been completed, the next process is that of risk ______________.
Select correct option:
Detection
Criticality analysis
Scrutiny
Mitigation
Question # 2 of 10 ( Start time: 09:40:09 AM ) Total Marks: 1
Intruder might try to remove hard disks is an example of Logical intrusion
Select correct option:
True
False
Question # 3 of 10 ( Start time: 09:41:32 AM ) Total Marks: 1
Which of the following refers to individuals using their skills to forward a political agenda, possibly breaking the law in the process, but justifying their actions for political reasons.
Select correct option:
Hacker
Intruder
Hacktivist
Cracker
Question # 4 of 10 ( Start time: 09:42:07 AM ) Total Marks: 1
Providing independent assurance to management regarding the appropriateness of the security objectives is the responsibility of _________.
Select correct option:
Information systems auditors
Data owners
Process owners
End users
Question # 5 of 10 ( Start time: 09:42:45 AM ) Total Marks: 1
Processing instructions carried out by theOperating system and application software should be monitored by implementation of controls.
Select correct option:
True
False
Question # 6 of 10 ( Start time: 09:43:29 AM ) Total Marks: 1
The protection of information from unauthorized disclosure explains the concept of system and data ______________.
Select correct option:
Completeness
Consistency
Reliability
Confidentiality
Question # 7 of 10 ( Start time: 09:44:13 AM ) Total Marks: 1
Traversing of a record of every keystroke, often called :
Select correct option:
Keystroke Monitoring
Logical Key Monitoring
Physical Key Monitoring
Primary Key Monitoring
Question # 8 of 10 ( Start time: 09:45:15 AM ) Total Marks: 1
Which of the following are normally skilled programmers, and have been known to crack system passwords, with quite an ease
Select correct option:
Hackers
Crackers
Hacktivists
Intruders
Question # 9 of 10 ( Start time: 09:45:49 AM ) Total Marks: 1
Which one of the following is not classified as biometrics?
Select correct option:
Digital Password
Sound of your voice
Blood vessels in the retina of your eye
Finger Prints
Question # 10 of 10 ( Start time: 09:46:49 AM ) Total Marks: 1
Which one of the following computer systems uses duplication of components and data to cope with systems failures?
Select correct option:
Fault-tolerant systems
EIS
MIS
OIS
Quiz Start Time: 03:47 PM Time Left 89
sec(s)
Question # 1 of 10 ( Start time: 03:47:08 PM ) Total Marks: 1
Which of the following controls over transporting data safely through local area networks (LAN’s) or wide area networks (WAN’s).
Select correct option:
Communication Controls
Access Controls
Security COntrols
Data Base Controls
Quiz Start Time: 03:47 PM Time Left 89
sec(s)
Question # 2 of 10 ( Start time: 03:47:48 PM ) Total Marks: 1
Implementation of controls is a critical security feature of which of the following systems.
Select correct option:
Information
Business
System
Management
Quiz Start Time: 03:47 PM Time Left 89
sec(s)
Question # 3 of 10 ( Start time: 03:48:28 PM ) Total Marks: 1
Which of the following is a program not a virusbut it installs a virus on the PC while performing another function.
Select correct option:
Dropper
Trojans
worm
None of above options
Quiz Start Time: 03:47 PM Time Left 89
sec(s)
Question # 4 of 10 ( Start time: 03:49:04 PM ) Total Marks: 1
Which of the following may also detect outbound traffic to guard against spy ware, which could be sending your surfing habits to a Web site
Select correct option:
Personal Firewall
Password
PIN
ID
Quiz Start Time: 03:47 PM Time Left 87
sec(s)
Question # 5 of 10 ( Start time: 03:49:32 PM ) Total Marks: 1
Cryptography primarily consists of Two basic processes.
Select correct option:
True
False
Quiz Start Time: 03:47 PM Time Left 89
sec(s)
Question # 6 of 10 ( Start time: 03:50:03 PM ) Total Marks: 1
Which of the following assigns overall responsibility for the security of information
Select correct option:
Security Professionals
Executive Management
Data Owners
Option a and b
Quiz Start Time: 03:47 PM Time Left 89
sec(s)
Question # 7 of 10 ( Start time: 03:50:37 PM ) Total Marks: 1
Wireless computing devices are not subject to viruses.
Select correct option:
True
False
Quiz Start Time: 03:47 PM Time Left 89
sec(s)
Question # 8 of 10 ( Start time: 03:51:36 PM ) Total Marks: 1
When voltage that is received does not stay stable is referred as:
Select correct option:
power factor
power game
power dissipation
power fluctuation
Quiz Start Time: 03:47 PM Time Left 89
sec(s)
Question # 9 of 10 ( Start time: 03:53:07 PM ) Total Marks: 1
The first step in a successful attack against availability or confidentiality of information may be the violation of ______________.
Select correct option:
Completeness constraints
Consistency
Integrity
Reliability
Quiz Start Time: 03:47 PM Time Left 89
sec(s)
Question # 10 of 10 ( Start time: 03:54:04 PM ) Total Marks: 1
Worms can destroy data and programs as well as disrupt or even halt the operation of computer networks.
Select correct option:
True
False
sec(s)
Question # 1 of 10 ( Start time: 03:47:08 PM ) Total Marks: 1
Which of the following controls over transporting data safely through local area networks (LAN’s) or wide area networks (WAN’s).
Select correct option:
Communication Controls
Access Controls
Security COntrols
Data Base Controls
Quiz Start Time: 03:47 PM Time Left 89
sec(s)
Question # 2 of 10 ( Start time: 03:47:48 PM ) Total Marks: 1
Implementation of controls is a critical security feature of which of the following systems.
Select correct option:
Information
Business
System
Management
Quiz Start Time: 03:47 PM Time Left 89
sec(s)
Question # 3 of 10 ( Start time: 03:48:28 PM ) Total Marks: 1
Which of the following is a program not a virusbut it installs a virus on the PC while performing another function.
Select correct option:
Dropper
Trojans
worm
None of above options
Quiz Start Time: 03:47 PM Time Left 89
sec(s)
Question # 4 of 10 ( Start time: 03:49:04 PM ) Total Marks: 1
Which of the following may also detect outbound traffic to guard against spy ware, which could be sending your surfing habits to a Web site
Select correct option:
Personal Firewall
Password
PIN
ID
Quiz Start Time: 03:47 PM Time Left 87
sec(s)
Question # 5 of 10 ( Start time: 03:49:32 PM ) Total Marks: 1
Cryptography primarily consists of Two basic processes.
Select correct option:
True
False
Quiz Start Time: 03:47 PM Time Left 89
sec(s)
Question # 6 of 10 ( Start time: 03:50:03 PM ) Total Marks: 1
Which of the following assigns overall responsibility for the security of information
Select correct option:
Security Professionals
Executive Management
Data Owners
Option a and b
Quiz Start Time: 03:47 PM Time Left 89
sec(s)
Question # 7 of 10 ( Start time: 03:50:37 PM ) Total Marks: 1
Wireless computing devices are not subject to viruses.
Select correct option:
True
False
Quiz Start Time: 03:47 PM Time Left 89
sec(s)
Question # 8 of 10 ( Start time: 03:51:36 PM ) Total Marks: 1
When voltage that is received does not stay stable is referred as:
Select correct option:
power factor
power game
power dissipation
power fluctuation
Quiz Start Time: 03:47 PM Time Left 89
sec(s)
Question # 9 of 10 ( Start time: 03:53:07 PM ) Total Marks: 1
The first step in a successful attack against availability or confidentiality of information may be the violation of ______________.
Select correct option:
Completeness constraints
Consistency
Integrity
Reliability
Quiz Start Time: 03:47 PM Time Left 89
sec(s)
Question # 10 of 10 ( Start time: 03:54:04 PM ) Total Marks: 1
Worms can destroy data and programs as well as disrupt or even halt the operation of computer networks.
Select correct option:
True
False
Question # 1 of 10 ( Start time: 08:40:59 PM ) Total Marks: 1
A person either Hacker or Hacktivist or cracker is actually an intruder.
Select correct option:
True
False
Question # 2 of 10 ( Start time: 08:42:21 PM ) Total Marks: 1
Measuring technical assessment of a computing system is known as:
Select correct option:
security plan
security measures
security audit
security lapse
Question # 3 of 10 ( Start time: 08:43:32 PM ) Total Marks: 1
Due to unauthorized changes in data, its ___________ is lost.
Select correct option:
Sharing
Consistency
Integrity
Redundancy
Question # 4 of 10 ( Start time: 08:44:53 PM ) Total Marks: 1
Which of the following can be used together with access controls to identify and provide information about users suspected of improper modification of data
Select correct option:
Control Log
Audit Trial
Audit control
Control Trial
Question # 5 of 10 ( Start time: 08:46:13 PM ) Total Marks: 1
When voltage that is received does not stay stable is referred as:
Select correct option:
power factor
power game
power dissipation
power fluctuation
Question # 6 of 10 ( Start time: 08:47:33 PM ) Total Marks: 1
The protection of information from unauthorized disclosure explains the concept of system and data ______________.
Select correct option:
Completeness
Consistency
Reliability
Confidentiality
Question # 7 of 10 ( Start time: 08:48:35 PM ) Total Marks: 1
A sniffer forges the return address of an e-mail so that the e-mail message appears to come from someone other than the sender.
Select correct option:
True
False
Question # 8 of 10 ( Start time: 08:49:55 PM ) Total Marks: 1
There are typically four kinds of audit records
Select correct option:
True
False
Question # 9 of 10 ( Start time: 08:51:22 PM ) Total Marks: 1
Which of the following assigns overall responsibility for the security of information
Select correct option:
Security Professionals
Executive Management
Data Owners
Option a and b
Question # 10 of 10 ( Start time: 08:52:07 PM ) Total Marks: 1
Which of the following usually contain records describing system events, application events, or user events?
Select correct option:
An event-oriented log
A record of every keystroke
Option a and b
None of these
by VUsolutions
0 comments
Post a Comment