Beruflich Dokumente
Kultur Dokumente
True
False
Intrusion
Damage
Threat
None of these options
Meaning of threat
In literal terms, an expression of an intention to inflict pain,
injury, evil, or punishment, and an indication of impending
danger or harm.
True
False
System auditors
Data owners
Process owners
End users
Viruses
Worms
Trojans
Sniffers
True
False
The out put of Threat Identification phase is a threat statement identifying and
defining threats.
Select correct option:
True
False
Behavior blockers
Active Monitors
Anti Virus
Scanners
Behavior blockers
Focus on detecting potentially abnormal behavior in function of
operating system or request made by application software.
Which of the following may also detect outbound traffic to guard against spy ware,
which could be sending your surfing habits to a Web site
Select correct option:
Personal Firewall
Password
PIN
ID
: Which of the following are normally skilled programmers, and have been known
to crack system passwords, with quite an ease
Select correct option:
Hackers
Crackers
Hacktivists
Intruders
Hackers
Are normally skilled programmers, and have been known to
crack system passwords, with quite an ease.
Risk Management
Executive management
Audit Trial
None of above
Logical Threat
Physical Threat
option a and b
None of above options
Security
Authenticity
Integrity
None of any options
Three
Four
Five
Two
True
False
Access controls focus on the correct identification of the user
seeking permission to access the system. There can be various
sources of identifying and authenticating the user.
Information
Business
System
Management
Information security
Documentation
Risk assessments
Control analysis
True
False
Intrusion Detection
Audit trial
Control Trial
Documentation
Which of the following scans the operating system and application soft ware for
any virus based on the viruses they contain.
Select correct option:
Anti Virus
Scanners
Active Monitors
None of above options
They scan the operating system and application soft ware for
any virus based on the viruses they contain.
Automated data are less susceptible to destruction and misuse than paper data
Select correct option:
True
False
: Controls can be classified in _____ categories
Select correct option:
Two
Three
Four
Which of the following is the secret character string that is required to log onto a
computer system
Select correct option:
ID
PIN
PASSWORD
none of these
True
False
Audit Trial
Control Log
Control Trial
Audit Control
An audit trail is a logical record of computer
activities/usage/processing pertaining to an operating or
application system or user activities.
DoS viruses
Worm viruses
Virus hoaxes
An audit trail may record "before" and "after" images, also called Snapshots of
records.
Select correct option:
True
False
Logical Intrusion skills needed to exploit logical exposures are more technical
and complex as compared to physical exposures.
Select correct option:
True
False
Logical intrusion
The skills needed to exploit logical exposures are more
technical and complex as compared to physical exposures.
Generally a similar term used in relation to logical intrusion is
hacking.
:
Which of the following is the process of measuring, or assessing risk and then
developing strategies to manage the risk?
Select correct option:
Risk Management
Executive management
Audit Trial
Data Owners
Process Owners
Executive Management
Users
Access
Communication
Data Base
An event-oriented log
A record of every keystroke
Option a and b
None of these
: Which of the following is the science and art of transforming messages to make
them secure and immune to attacks.
Select correct option:
Cryptography
crypto Analysis
All of these
None of these
Risk Identification
Assessing Documentation
Threat Identification
Implementation
security plan
security measures
security audit
security lapse
True
False
DoS viruses
Worm viruses
Virus hoaxes
Trojan horses
Dropper
Trojans
worm
None of above options
. Dropper
A dropper is a program not a virus. It installs a virus on the PC
while performing another function.
Which of the following controls over transporting data safely through local area
networks (LAN’s) or wide area networks (WAN’s).
Select correct option:
Communication Controls
Access Controls
Security COntrols
Data Base Controls
True
False
Active Monitors
Anti Virus software
Behavior blockers
Logical intrusion
Logical
This refers to damage caused to the software and data without
physical presence. Examples are viruses and worms, logical intrusion
commonly referred to as hacking.
The out put of Threat Identification phase is a threat statement identifying and
defining threats.
Select correct option:
True
False
Control Log
Audit Trial
Audit control
Control Trial
: Automated data are less susceptible to destruction and misuse than paper data
Select correct option:
True
False
that is developed through OOAD is easy to test due to the use of _______.
Select correct option:
Vulnerability
Threat Identification
Audit Trial
Cryptography
Encryption
Decryption
None of these
Which of the following is a person who attempts to invade the privacy of the
system.
Select correct option:
Hacker
Cracker
Sniffer
Spammer
Fire wall is the primary method for keeping a computer secure from intruders.
Select correct option:
True
False
security plan
security measures
security audit
security lapse
: Logical Intrusion skills needed to exploit logical exposures are more technical
and complex as compared to physical exposures.
Select correct option:
True
False
Cryptography
Encryption
Decryption
None of these
fixed
variable
subnet
changeable
Security Professionals
Executive Management
Data Owners
Option a and b
Executive Management — assigned overall responsibility for the
security of information
Methods
Operations
Attributes
Status
Audit trial
Control Trial
Documentation
Intrusion Detection
: MIS uses duplication of components and data to cope with systems failures?
Select correct option:
True
False
True
False
This is caused by improper
Application of programming logic. For example, free trial
versions of soft wares are available on line. These beta
versions are not tested fully and often contain bugs
Which of is the primary method for keeping a computer secure from intruders.
Select correct option:
Anti Virus
Scanner
Fire Wall
IDS
Worms can destroy data and programs as well as disrupt or even halt the
operation of computer networks.
Select correct option:
True
False
A Trojan horse virus stays dormant until a specific time or data condition is met
Select correct option:
True
False
True
False
personal identification number (PIN) is a secret shared
between a user and a system that can be used to authenticate
the user to the system.
Documentation
Audit Trial
Control Trial
None of these options
True
False
True
False
It is an
incorrect functioning of a particular procedure in a program.
This is caused by improper application of programming logic
An event-oriented log
A record of every keystroke
Option a and b
None of these
Continuous
Tedious
Expensive
Corpora ting
Which of the following can be used together with access controls to identify and
provide information about users suspected of improper modification of data.
Select correct option:
Audit Trial
Control Log
Audit control
Control Trial
Worms can destroy data and programs as well as disrupt or even halt the
operation of computer networks.
Select correct option:
True
False
Un-interruptible
power supplies (UPS) can be used to help avoid the turning on
and off of electrical equipment.
Which of the following refers to damage caused to the software and data without
any physical damage to the computers.
Select correct option:
Logical Threat
Physical Threat
Option a and b