Академический Документы
Профессиональный Документы
Культура Документы
1.
2.
3.
4.
5.
6.
7.
8.
Assignment B
1.
2.
3.
Assignment C
Question No. 1
Marks 10
In computer security............. means that the computer sytem assets can be modified
only by authorized parties
Options
Confidentiality
Integrity
Availability
Authencity
Question No. 2
A computer security................ means that the information in acomputer sytem only
can be accessible for reading by authorized parties
Options
Marks 10
confidentiality
Integrity
Availibility
Authencity
Question No. 3
Marks 10
Which of the following is independent malicious program that need not any host
programe ?
Options
Trap Doors
Trojan horse
virus
worm
Question No. 4
Marks 10
Question No. 5
Marks -
10
which of the following malicious prog do not replicate authomatically ?
Options
Trojan Horse
Virus
Worm
Zombie
Question No. 6
Marks 10
Question No. 7
state whether true of falls 1.A worm mails a copy of itself to other system 2.a worm
executes a copy of itself on another system
Options
true, false
false, true
Marks 10
true, true
false, false
Question No. 8
Marks 10
............ are used in denial of service attacks, typically against targeted web sites
Options
Worm
Zombie
Virus
Trojan horse
Question No. 9
Marks 10
Question No. 10
State whether the following statement is true 1. A macro virus is paltform
indepecent 2. Macro viruese infect documents, not executabel portions of code
Marks 10
Options
1 only
2 only
both 1 & 2
none
Question No. 11
Marks 10
Question No. 12
In.................... the virus places an identical copy of itself into other programs or
into certain sytem areas on the disk
Options
Dormat phase
Propagation phase
Triggering Phase
execution phase
Marks 10
Question No. 13
Marks 10
In the world of computing, the essential element that controls how computers are
used is
Options
ethics
legal laws
security requiremnts
business demands
Question No. 14
Marks 10
The guidelines for the morally acceptable use of computers in socitey are
Options
computer ethics
privacy
morality
legal system
Question No. 15
The issues that deal with the collection and use of data about individuals is
Options
access
property
Marks 10
accuracy
privacy
Question No. 16
Marks 10
Marks - 10
The ethical issue that involves who is able to read and use data is
Options
access
property
accuracy
privacy
Question No. 18
The vast industry involves the gathering and selling of personal data is
Options
direct marketing
Marks 10
fund raising
information reselling
government agencies
Question No. 19
Marks 10
Question No. 20
Marks 10
Question No. 21
Testing the BCP regularly comes under the phase:
Marks 10
Options
Risk Assessment
BIA
Risk Monitoring
Risk Management
Question No. 22
Marks 10
Marks - 10
By using "__________" option in Windows, you can limit the ability of users and
groups to perform various actions by assigning permissions.
Options
Network and Internet
Hardware and Sound
Programs
Local Users and Groups
Question No. 24
Marks 10
Question No. 25
Marks 10
Question No. 27
Marks - 10
Question No. 28
Marks 10
Which password management feature ensures that a user can not re use a password
for a specific time?
Options
Account Locking
Password Verification
Password History
Password Ageing
Question No. 29
Composing hard-to-guess passwords is a good practice.
Options
FALSE
May or May not be TRUE
TRUE
Not Sure
Marks 10
Question No. 30
Marks 10
Question No. 31
Marks 10
Question No. 32
When the sender and receiver do not have a possibility of denying sending or
receiving data, it is called the principle of:
Options
Confidentiality
Marks 10
Non-repudiation
Repudiation
Integrity
Question No. 33
Marks 10
While Symmetric key cryptography utilizes ___ key(s) for encryption, the
asymmetric key cryptography uses ___ key(s).
Options
1,2
2,1
1,1
2,3
Question No. 34
Marks 10
A software application that monitors network and system activities for malicious
content and policy violations is termed as:
Options
Firewall
Anti-Virus
Anti-Malware
Intrusion Detection System
Question No. 35
During an earthquake in Nepal, many computers were destroyed with significant
Marks 10
Question No. 36
Marks 10
Question No. 37
The local security policy of a system is a set of information regarding the security
of a local computer. It includes trusted _____, ______ accounts and ______
assigned to the accounts.
Options
Users, domain, privileges
Domains, user, privileges
Privileges, user, domains
Marks 10
Question No. 38
Marks 10
Question No. 39
Marks 10
Rahul, an IT Engineer, while working on his system, noticed that a new Notepad
tab has popped out and a message is being typed. This is an example of
Options
Unauthorized Access
Malicious Code
Network Attack
Password Attack
Question No. 40
A secret entry point in the code which could be exploited by malicious users is
called:
Options
Marks 10
Virus
Worm
Trapdoor
Trojan Horse