Internet Security -Section C

Embed Size (px)

Citation preview

  • 8/16/2019 Internet Security -Section C

    1/12

    Question No. 1

    In computer security............. means that the computer sytem assets can be modified only by authorized parties

     

    Options

     Confidentiality

     Integrity

     Availability

     Authencity

    Question No. 2

     A computer security................ means that the information in acomputer sytem only can be accessible for reading by authorized parties

     

    Options

     confidentiality

     Integrity

     Availibility

     Authencity

    Question No.

    !hich of the follo"ing is independent malicious program that need not any host programe #

     

    Options

     $rap %oors

     $ro&an horse

     virus

     "orm

    Question No. '

    $he .................... is code embedded in some legitimate program that is set to e(plode "hen certain conditions are met

     

    Options

  • 8/16/2019 Internet Security -Section C

    2/12

     $rap doors

     $ro&an horse

     )ogic bomb

     virus

    Question No. *

    "hich of the follo"ing malicious prog do not replicate authomatically #

     

    Options

     $ro&an +orse

     ,irus

     !orm

     -ombie

    ......................rograms can be used to accomplish functions indirectly that an unauthorized user not accomplish directly

     

    Options

     -ombie

     "orm

     $ro&an horse

     )ogic /omb

    Question No. 0

    state "hether true of falls 1.A "orm mails a copy of itself to other system 2.a "orm e(ecutes a copy of itself on another system

     

    Options

     true false

     false true

     true true

     false false

  • 8/16/2019 Internet Security -Section C

    3/12

    Question No.

    ............ are used in denial of service attac3s typically against targeted "eb sites

     

    Options

     !orm

     -ombie

     ,irus

     $ro&an horse

    ..................... is a form of virus e(plicitely designed to hide itself from detection by antivirus soft"are

     

    Options

     4tealth ,irus

     olymorphic virus

     arastic virus

     macro virus

    Question No. 15

    4tate "hether the follo"ing statement is true 1. A macro virus is paltform indepecent 2. 6acro viruese infect documents not e(ecutab

     

    Options

     1 only

     2 only

     both 1 7 2

     none

    Question No. 11

    $he type of auto e(ecuting macros in microsoft "ord is8are

     

  • 8/16/2019 Internet Security -Section C

    4/12

    Options

     auto e(ecute

     auto macro

     command macro

     all of the above

    In.................... the virus places an identical copy of itself into other programs or into certain sytem areas on the dis3

     

    Options

     %ormat phase

     ropagation phase

     $riggering hase

     e(ecution phase

    In the "orld of computing the essential element that controls ho" computers are used is

     

    Options

     ethics

     legal la"s

     security re9uiremnts

     business demands

    Question No. 1'

    $he guidelines for the morally acceptable use of computers in socitey are

     

    Options

     computer ethics

     privacy

     morality

     legal system

  • 8/16/2019 Internet Security -Section C

    5/12

    Question No. 1*

    $he issues that deal "ith the collection and use of data about individuals is

     

    Options

     access

     property

     accuracy

     privacy

    Question No. 1:

    $he ethical issue concerned "ith the correctness of data collected is

     

    Options

     access

     property

     ;(actness

     privacy

    Question No. 10

    $he ethical issue that involves "ho is able to read and use data is

     

    Options

     access

     property

     accuracy

     privacy

    Question No. 1

  • 8/16/2019 Internet Security -Section C

    6/12

    $he vast industry involves the gathering and selling of personal data is

     

    Options

     direct mar3eting

     fund raising

     information reselling

     government agencies

    Question No. 1<

    $he first step in developing a /usiness Continuity lan =/C> is developing a?

     

    Options

     /usiness Impact Analysis

     @is3 Analysis 4heet

     @is3 6itigation %ocument

     @is3 Assess ment 4heet

    Question No. 25

     An analysis of threats based on impacts and prioritizing business disruptions based on severity and occurrence comes under the seco

    "hich is? 

    Options

     @is3 6onitoring

     @is3 Assessment

     /IA

     @is3 6anagement

    Question No. 21

    $esting the /C regularly comes under the phase?

     

    Options

     @is3 Assessment

  • 8/16/2019 Internet Security -Section C

    7/12

     /IA

     @is3 6onitoring

     @is3 6anagement

    Question No. 22

    ;ffectiveness of a /C can be validated through

     

    Options

     6onitoring

     Assessment

     eedbac3

     $esting

    Question No. 2

    /y using BB option in !indo"s you can limit the ability of users and groups to perform various actions by assigning permi

     

    Options

     Net"or3 and Internet

     +ard"are and 4ound

     rograms

     )ocal Dsers and Eroups

     A !indo"s N$ is the administrative unit of directory services.

     

    Options

     %irectory

     ile

     %omain

     older 

    Question No. 2*

  • 8/16/2019 Internet Security -Section C

    8/12

    %omains olders Ob&ects are a part of structure of !indo"s O4.

     

    Options

     hysical

     )ogical

     /oth hysical and )ogical

     None of the above

    Question No. 2:

    ;ncrypting ile 4ystem =;4> is a feature of?

     

    Options

     6icrosoft !indo"s

     iO4

     )inu(

     Dni(

    Question No. 20

    CyberFattac3 is a 3ind of?

     Options

     Natural %isaster 

     6anF6ade disaster 

     /oth

     None of the above

    Question No. 2

    !hich pass"ord management feature ensures that a user can not re use a pass"ord for a specific time#

     

    Options

     Account )oc3ing

  • 8/16/2019 Internet Security -Section C

    9/12

  • 8/16/2019 Internet Security -Section C

    10/12

  • 8/16/2019 Internet Security -Section C

    11/12

     Accidental ;rror 

     6alicious use

     Dnauthorized access

     hysical $hreat

    Question No. :

    rocess to eliminate means of attac3 by patching vulnerabilities and turning off inessential services is called?

     

    Options

     6alicious Code elimination

     Attac3 revention 6echanism

     +ardening

     %isaster 6anagement

    Question No. 0

    $he local security policy of a system is a set of information regarding the security of a local computer. It includes trusted assigned to the accounts.

     

    Options

      Dsers domain privileges

     %omains user privileges

     rivileges user domains

     None of the above

    Question No.

     Administrator and Euest are e(amples of user accounts.

     

    Options

     %efault

     ;(plicit

     Implicit

  • 8/16/2019 Internet Security -Section C

    12/12

     None of the above

    Question No. <

    @ahul an I$ ;ngineer "hile "or3ing on his system noticed that a ne" Notepad tab has popped out and a message is being typed. $

     

    Options

     Dnauthorized Access

     6alicious Code

     Net"or3 Attac3

     ass"ord Attac3

    Question No. '5

     A secret entry point in the code "hich could be e(ploited by malicious users is called?

     

    Options

     ,irus

     !orm

     $rapdoor 

     $ro&an +orse