Tuesday, February 16, 2010

CS507 - 2nd ONLINE Quizzes

Question # 1 of 10
Which of the following refers to the process of identifying attempts to penetrate a system and gain unauthorized access
Select correct option:



Intrusion Detection
Audit trial
Control Trial
Documentation





Question # 2 of 10
A person either Hacker or Hacktivist or cracker is actually an intruder.
Select correct option:



True
False





Question # 3 of 10
Which of the following is responsible for ensuring that appropriate security, consistent with the organization’s security policy, that is embedded in their information systems.
Select correct option:



Data Owners
Process Owners
Executive Management
Users





Question # 4 of 10
MIS uses duplication of components and data to cope with systems failures?
Select correct option:



True
False


Question # 5 of 10
Which of the following may attack executable programs?
Select correct option:



Viruses
Worms
Trojans
Sniffers




Question # 6 of 10
Dropper is an example of Trojans
Select correct option:



True
False




Question # 7 of 10
Sasser, Netsky, and Sobig are all classified as:
Select correct option:



DoS viruses
Worm viruses
Virus hoaxes
Trojan horses


Question # 8 of 10
Which of the following is a logical record of computer activities, usage, processing pertaining to an operating or application system or user activities.
Select correct option:



Audit Trial
Control Log
Control Trial
Audit Control





Question # 9 of 10
UPS stands for----------------------
Select correct option:



Un-interrupted power supplies
Un-eruptible power supplies
Uni-enterrupted power supplies
None of above options





Question # 10 of 10
The protection of information from unauthorized disclosure explains the concept of system and data ______________.
Select correct option:



Completeness
Consistency
Reliability
Confidentiality

Question # 1 of 10 ( Start time: 09:38:46 AM ) Total Marks: 1
After the process of risk assessment has been completed, the next process is that of risk ______________.
Select correct option:



Detection

Criticality analysis

Scrutiny

Mitigation








Question # 2 of 10 ( Start time: 09:40:09 AM ) Total Marks: 1
Intruder might try to remove hard disks is an example of Logical intrusion
Select correct option:



True

False







Question # 3 of 10 ( Start time: 09:41:32 AM ) Total Marks: 1
Which of the following refers to individuals using their skills to forward a political agenda, possibly breaking the law in the process, but justifying their actions for political reasons.
Select correct option:



Hacker

Intruder

Hacktivist

Cracker








Question # 4 of 10 ( Start time: 09:42:07 AM ) Total Marks: 1
Providing independent assurance to management regarding the appropriateness of the security objectives is the responsibility of _________.
Select correct option:



Information systems auditors

Data owners

Process owners

End users









Question # 5 of 10 ( Start time: 09:42:45 AM ) Total Marks: 1
Processing instructions carried out by theOperating system and application software should be monitored by implementation of controls.
Select correct option:



True

False







Question # 6 of 10 ( Start time: 09:43:29 AM ) Total Marks: 1
The protection of information from unauthorized disclosure explains the concept of system and data ______________.
Select correct option:



Completeness

Consistency

Reliability

Confidentiality








Question # 7 of 10 ( Start time: 09:44:13 AM ) Total Marks: 1
Traversing of a record of every keystroke, often called :
Select correct option:



Keystroke Monitoring

Logical Key Monitoring

Physical Key Monitoring

Primary Key Monitoring








Question # 8 of 10 ( Start time: 09:45:15 AM ) Total Marks: 1
Which of the following are normally skilled programmers, and have been known to crack system passwords, with quite an ease
Select correct option:



Hackers

Crackers

Hacktivists

Intruders









Question # 9 of 10 ( Start time: 09:45:49 AM ) Total Marks: 1
Which one of the following is not classified as biometrics?
Select correct option:



Digital Password

Sound of your voice

Blood vessels in the retina of your eye

Finger Prints








Question # 10 of 10 ( Start time: 09:46:49 AM ) Total Marks: 1
Which one of the following computer systems uses duplication of components and data to cope with systems failures?
Select correct option:



Fault-tolerant systems

EIS

MIS

OIS

Quiz Start Time: 03:47 PM Time Left 89
sec(s)


Question # 1 of 10 ( Start time: 03:47:08 PM ) Total Marks: 1
Which of the following controls over transporting data safely through local area networks (LAN’s) or wide area networks (WAN’s).
Select correct option:

Communication Controls
Access Controls
Security COntrols
Data Base Controls

Quiz Start Time: 03:47 PM Time Left 89
sec(s)


Question # 2 of 10 ( Start time: 03:47:48 PM ) Total Marks: 1
Implementation of controls is a critical security feature of which of the following systems.
Select correct option:

Information
Business
System
Management



Quiz Start Time: 03:47 PM Time Left 89
sec(s)


Question # 3 of 10 ( Start time: 03:48:28 PM ) Total Marks: 1
Which of the following is a program not a virusbut it installs a virus on the PC while performing another function.
Select correct option:

Dropper
Trojans
worm
None of above options


Quiz Start Time: 03:47 PM Time Left 89
sec(s)


Question # 4 of 10 ( Start time: 03:49:04 PM ) Total Marks: 1
Which of the following may also detect outbound traffic to guard against spy ware, which could be sending your surfing habits to a Web site
Select correct option:

Personal Firewall
Password
PIN
ID


Quiz Start Time: 03:47 PM Time Left 87
sec(s)


Question # 5 of 10 ( Start time: 03:49:32 PM ) Total Marks: 1
Cryptography primarily consists of Two basic processes.
Select correct option:

True
False


Quiz Start Time: 03:47 PM Time Left 89
sec(s)


Question # 6 of 10 ( Start time: 03:50:03 PM ) Total Marks: 1
Which of the following assigns overall responsibility for the security of information
Select correct option:

Security Professionals
Executive Management
Data Owners
Option a and b



Quiz Start Time: 03:47 PM Time Left 89
sec(s)


Question # 7 of 10 ( Start time: 03:50:37 PM ) Total Marks: 1
Wireless computing devices are not subject to viruses.
Select correct option:

True
False

Quiz Start Time: 03:47 PM Time Left 89
sec(s)


Question # 8 of 10 ( Start time: 03:51:36 PM ) Total Marks: 1
When voltage that is received does not stay stable is referred as:
Select correct option:

power factor
power game
power dissipation
power fluctuation


Quiz Start Time: 03:47 PM Time Left 89
sec(s)


Question # 9 of 10 ( Start time: 03:53:07 PM ) Total Marks: 1
The first step in a successful attack against availability or confidentiality of information may be the violation of ______________.
Select correct option:

Completeness constraints
Consistency
Integrity
Reliability



Quiz Start Time: 03:47 PM Time Left 89
sec(s)


Question # 10 of 10 ( Start time: 03:54:04 PM ) Total Marks: 1
Worms can destroy data and programs as well as disrupt or even halt the operation of computer networks.
Select correct option:

True
False



Question # 1 of 10 ( Start time: 08:40:59 PM ) Total Marks: 1
A person either Hacker or Hacktivist or cracker is actually an intruder.
Select correct option:



True

False



Question # 2 of 10 ( Start time: 08:42:21 PM ) Total Marks: 1
Measuring technical assessment of a computing system is known as:
Select correct option:



security plan

security measures

security audit

security lapse



Question # 3 of 10 ( Start time: 08:43:32 PM ) Total Marks: 1
Due to unauthorized changes in data, its ___________ is lost.
Select correct option:



Sharing

Consistency

Integrity

Redundancy



Question # 4 of 10 ( Start time: 08:44:53 PM ) Total Marks: 1
Which of the following can be used together with access controls to identify and provide information about users suspected of improper modification of data
Select correct option:



Control Log

Audit Trial

Audit control

Control Trial



Question # 5 of 10 ( Start time: 08:46:13 PM ) Total Marks: 1
When voltage that is received does not stay stable is referred as:
Select correct option:



power factor

power game

power dissipation

power fluctuation


Question # 6 of 10 ( Start time: 08:47:33 PM ) Total Marks: 1
The protection of information from unauthorized disclosure explains the concept of system and data ______________.
Select correct option:



Completeness

Consistency

Reliability

Confidentiality



Question # 7 of 10 ( Start time: 08:48:35 PM ) Total Marks: 1
A sniffer forges the return address of an e-mail so that the e-mail message appears to come from someone other than the sender.
Select correct option:



True

False






Question # 8 of 10 ( Start time: 08:49:55 PM ) Total Marks: 1
There are typically four kinds of audit records
Select correct option:



True

False




Question # 9 of 10 ( Start time: 08:51:22 PM ) Total Marks: 1
Which of the following assigns overall responsibility for the security of information
Select correct option:



Security Professionals

Executive Management

Data Owners

Option a and b





Question # 10 of 10 ( Start time: 08:52:07 PM ) Total Marks: 1
Which of the following usually contain records describing system events, application events, or user events?
Select correct option:



An event-oriented log

A record of every keystroke

Option a and b

None of these

by VUsolutions

0 comments:

Post a Comment