4th quiz of CS507

advertisement
MC090204381 : Abdul Ghaffar Qureshi
Time Left
77
sec(s)
Quiz Start Time: 01:19 PM
Question # 1 of 10 ( Start time: 01:19:23 PM )
Management controls are also known as:
Total Marks: 1
Select correct option:
Technical controls
Correct
Non-technical controls
Scientific controls
Logical controls
Click here to Save Answ er & Move to Next Question
MC090204381 : Abdul Ghaffar Qureshi
Time Left
89
sec(s)
Quiz Start Time: 01:19 PM
Question # 2 of 10 ( Start time: 01:20:24 PM )
Total Marks: 1
Which of the following are responsible for providing independent assurance to
management on the appropriateness of the security objectives?
Select correct option:
Information Systems Auditors
Correct
Executive Management
Security Managers
Data ow ners
Click here to Save Answ er & Move to Next Question
MC090204381 : Abdul Ghaffar Qureshi
Time Left
http://www.vustudents.net
89
sec(s)
Quiz Start Time: 01:19 PM
Question # 3 of 10 ( Start time: 01:20:55 PM )
Total Marks: 1
__________ site backup is an appropriate choice for organizations if fast recovery is
critical.
Select correct option:
Hot
Correct
Cold
Cool
Warm
Click here to Save Answ er & Move to Next Question
MC090204381 : Abdul Ghaffar Qureshi
Time Left
88
sec(s)
Quiz Start Time: 01:19 PM
Question # 4 of 10 ( Start time: 01:22:12 PM )
Total Marks: 1
________ site backup is an appropriate choice for organizations if they can bear some
downtime.
Select correct option:
Warm
Cool
Cold
Correct
Hot
Click here to Save Answ er & Move to Next Question
MC090204381 : Abdul Ghaffar Qureshi
Quiz Start Time: 01:19 PM
Time Left
89
sec(s)
Question # 5 of 10 ( Start time: 01:22:57 PM )
Total Marks: 1
Which of the following is a program not a virus but it installs a virus on the PC while
performing another function?
Select correct option:
Dropper
Correct
Trojans
w orm
None of above options
Click here to Save Answ er & Move to Next Question
MC090204381 : Abdul Ghaffar Qureshi
Time Left
88
sec(s)
Quiz Start Time: 01:19 PM
Question # 6 of 10 ( Start time: 01:23:26 PM )
A person either Hacker or Hacktivist or cracker is actually an intruder.
Select correct option:
True
False
Correct
Total Marks: 1
Click here to Save Answ er & Move to Next Question
MC090204381 : Abdul Ghaffar Qureshi
Time Left
89
sec(s)
Quiz Start Time: 01:19 PM
Question # 7 of 10 ( Start time: 01:24:25 PM )
Which one of the following is not classified as biometrics?
Total Marks: 1
Select correct option:
Digital Passw ord
Correct
Sound of your voice
Blood vessels in the retina of your eye
Finger Prints
Click here to Save Answ er & Move to Next Question
MC090204381 : Abdul Ghaffar Qureshi
http://www.vustudents.net
Time Left
89
sec(s)
Quiz Start Time: 01:19 PM
Question # 8 of 10 ( Start time: 01:25:23 PM )
The first step after threat attacks the system would be
Select correct option:
Total Marks: 1
Control analysis
Data sensitivity analysis
Threat analysis
Not sure
Impact analysis
Click here to Save Answ er & Move to Next Question
MC090204381 : Abdul Ghaffar Qureshi
Time Left
89
sec(s)
Quiz Start Time: 01:19 PM
Question # 9 of 10 ( Start time: 01:26:48 PM )
Bug is an internal malfunction of the software.
Total Marks: 1
Select correct option:
True
Correct
False
Click here to Save Answ er & Move to Next Question
MC090204381 : Abdul Ghaffar Qureshi
Time Left
89
sec(s)
Quiz Start Time: 01:19 PM
Question # 10 of 10 ( Start time: 01:27:10 PM )
Total Marks: 1
In the context of information security, data cannot be modified without authorization is
known as _________. http://www.vustudents.net
Select correct option:
user’s rights
Not sure
privileges
integrity
privacy
Click here to Save Answ er & Move to Next Question
Download