MC090204381 : Abdul Ghaffar Qureshi Time Left 77 sec(s) Quiz Start Time: 01:19 PM Question # 1 of 10 ( Start time: 01:19:23 PM ) Management controls are also known as: Total Marks: 1 Select correct option: Technical controls Correct Non-technical controls Scientific controls Logical controls Click here to Save Answ er & Move to Next Question MC090204381 : Abdul Ghaffar Qureshi Time Left 89 sec(s) Quiz Start Time: 01:19 PM Question # 2 of 10 ( Start time: 01:20:24 PM ) Total Marks: 1 Which of the following are responsible for providing independent assurance to management on the appropriateness of the security objectives? Select correct option: Information Systems Auditors Correct Executive Management Security Managers Data ow ners Click here to Save Answ er & Move to Next Question MC090204381 : Abdul Ghaffar Qureshi Time Left http://www.vustudents.net 89 sec(s) Quiz Start Time: 01:19 PM Question # 3 of 10 ( Start time: 01:20:55 PM ) Total Marks: 1 __________ site backup is an appropriate choice for organizations if fast recovery is critical. Select correct option: Hot Correct Cold Cool Warm Click here to Save Answ er & Move to Next Question MC090204381 : Abdul Ghaffar Qureshi Time Left 88 sec(s) Quiz Start Time: 01:19 PM Question # 4 of 10 ( Start time: 01:22:12 PM ) Total Marks: 1 ________ site backup is an appropriate choice for organizations if they can bear some downtime. Select correct option: Warm Cool Cold Correct Hot Click here to Save Answ er & Move to Next Question MC090204381 : Abdul Ghaffar Qureshi Quiz Start Time: 01:19 PM Time Left 89 sec(s) Question # 5 of 10 ( Start time: 01:22:57 PM ) Total Marks: 1 Which of the following is a program not a virus but it installs a virus on the PC while performing another function? Select correct option: Dropper Correct Trojans w orm None of above options Click here to Save Answ er & Move to Next Question MC090204381 : Abdul Ghaffar Qureshi Time Left 88 sec(s) Quiz Start Time: 01:19 PM Question # 6 of 10 ( Start time: 01:23:26 PM ) A person either Hacker or Hacktivist or cracker is actually an intruder. Select correct option: True False Correct Total Marks: 1 Click here to Save Answ er & Move to Next Question MC090204381 : Abdul Ghaffar Qureshi Time Left 89 sec(s) Quiz Start Time: 01:19 PM Question # 7 of 10 ( Start time: 01:24:25 PM ) Which one of the following is not classified as biometrics? Total Marks: 1 Select correct option: Digital Passw ord Correct Sound of your voice Blood vessels in the retina of your eye Finger Prints Click here to Save Answ er & Move to Next Question MC090204381 : Abdul Ghaffar Qureshi http://www.vustudents.net Time Left 89 sec(s) Quiz Start Time: 01:19 PM Question # 8 of 10 ( Start time: 01:25:23 PM ) The first step after threat attacks the system would be Select correct option: Total Marks: 1 Control analysis Data sensitivity analysis Threat analysis Not sure Impact analysis Click here to Save Answ er & Move to Next Question MC090204381 : Abdul Ghaffar Qureshi Time Left 89 sec(s) Quiz Start Time: 01:19 PM Question # 9 of 10 ( Start time: 01:26:48 PM ) Bug is an internal malfunction of the software. Total Marks: 1 Select correct option: True Correct False Click here to Save Answ er & Move to Next Question MC090204381 : Abdul Ghaffar Qureshi Time Left 89 sec(s) Quiz Start Time: 01:19 PM Question # 10 of 10 ( Start time: 01:27:10 PM ) Total Marks: 1 In the context of information security, data cannot be modified without authorization is known as _________. http://www.vustudents.net Select correct option: user’s rights Not sure privileges integrity privacy Click here to Save Answ er & Move to Next Question