VUsolutions Transferred to AchiKhasi.com

From December 2011, this blog www.VUsolutions.blogspot.com is transferred to http://achikhasi.com/vu/ . So, you may visit http://achikhasi.com/vu/ for latest study related help.

Back to home VUsolutions

VUsolutions Fans Club [join us for MORE solutions]

VUsolutions on Facebook

CS507 - 2nd ONLINE Quizzes

Wednesday, February 17, 2010 Posted In Edit This
Question # 1 of 10
Which of the following refers to the process of identifying attempts to penetrate a system and gain unauthorized access
Select correct option:



Intrusion Detection
Audit trial
Control Trial
Documentation





Question # 2 of 10
A person either Hacker or Hacktivist or cracker is actually an intruder.
Select correct option:



True
False





Question # 3 of 10
Which of the following is responsible for ensuring that appropriate security, consistent with the organization’s security policy, that is embedded in their information systems.
Select correct option:



Data Owners
Process Owners
Executive Management
Users





Question # 4 of 10
MIS uses duplication of components and data to cope with systems failures?
Select correct option:



True
False


Question # 5 of 10
Which of the following may attack executable programs?
Select correct option:



Viruses
Worms
Trojans
Sniffers




Question # 6 of 10
Dropper is an example of Trojans
Select correct option:



True
False




Question # 7 of 10
Sasser, Netsky, and Sobig are all classified as:
Select correct option:



DoS viruses
Worm viruses
Virus hoaxes
Trojan horses


Question # 8 of 10
Which of the following is a logical record of computer activities, usage, processing pertaining to an operating or application system or user activities.
Select correct option:



Audit Trial
Control Log
Control Trial
Audit Control





Question # 9 of 10
UPS stands for----------------------
Select correct option:



Un-interrupted power supplies
Un-eruptible power supplies
Uni-enterrupted power supplies
None of above options





Question # 10 of 10
The protection of information from unauthorized disclosure explains the concept of system and data ______________.
Select correct option:



Completeness
Consistency
Reliability
Confidentiality

Question # 1 of 10 ( Start time: 09:38:46 AM ) Total Marks: 1
After the process of risk assessment has been completed, the next process is that of risk ______________.
Select correct option:



Detection

Criticality analysis

Scrutiny

Mitigation








Question # 2 of 10 ( Start time: 09:40:09 AM ) Total Marks: 1
Intruder might try to remove hard disks is an example of Logical intrusion
Select correct option:



True

False







Question # 3 of 10 ( Start time: 09:41:32 AM ) Total Marks: 1
Which of the following refers to individuals using their skills to forward a political agenda, possibly breaking the law in the process, but justifying their actions for political reasons.
Select correct option:



Hacker

Intruder

Hacktivist

Cracker








Question # 4 of 10 ( Start time: 09:42:07 AM ) Total Marks: 1
Providing independent assurance to management regarding the appropriateness of the security objectives is the responsibility of _________.
Select correct option:



Information systems auditors

Data owners

Process owners

End users









Question # 5 of 10 ( Start time: 09:42:45 AM ) Total Marks: 1
Processing instructions carried out by theOperating system and application software should be monitored by implementation of controls.
Select correct option:



True

False







Question # 6 of 10 ( Start time: 09:43:29 AM ) Total Marks: 1
The protection of information from unauthorized disclosure explains the concept of system and data ______________.
Select correct option:



Completeness

Consistency

Reliability

Confidentiality








Question # 7 of 10 ( Start time: 09:44:13 AM ) Total Marks: 1
Traversing of a record of every keystroke, often called :
Select correct option:



Keystroke Monitoring

Logical Key Monitoring

Physical Key Monitoring

Primary Key Monitoring








Question # 8 of 10 ( Start time: 09:45:15 AM ) Total Marks: 1
Which of the following are normally skilled programmers, and have been known to crack system passwords, with quite an ease
Select correct option:



Hackers

Crackers

Hacktivists

Intruders









Question # 9 of 10 ( Start time: 09:45:49 AM ) Total Marks: 1
Which one of the following is not classified as biometrics?
Select correct option:



Digital Password

Sound of your voice

Blood vessels in the retina of your eye

Finger Prints








Question # 10 of 10 ( Start time: 09:46:49 AM ) Total Marks: 1
Which one of the following computer systems uses duplication of components and data to cope with systems failures?
Select correct option:



Fault-tolerant systems

EIS

MIS

OIS

Quiz Start Time: 03:47 PM Time Left 89
sec(s)


Question # 1 of 10 ( Start time: 03:47:08 PM ) Total Marks: 1
Which of the following controls over transporting data safely through local area networks (LAN’s) or wide area networks (WAN’s).
Select correct option:

Communication Controls
Access Controls
Security COntrols
Data Base Controls

Quiz Start Time: 03:47 PM Time Left 89
sec(s)


Question # 2 of 10 ( Start time: 03:47:48 PM ) Total Marks: 1
Implementation of controls is a critical security feature of which of the following systems.
Select correct option:

Information
Business
System
Management



Quiz Start Time: 03:47 PM Time Left 89
sec(s)


Question # 3 of 10 ( Start time: 03:48:28 PM ) Total Marks: 1
Which of the following is a program not a virusbut it installs a virus on the PC while performing another function.
Select correct option:

Dropper
Trojans
worm
None of above options


Quiz Start Time: 03:47 PM Time Left 89
sec(s)


Question # 4 of 10 ( Start time: 03:49:04 PM ) Total Marks: 1
Which of the following may also detect outbound traffic to guard against spy ware, which could be sending your surfing habits to a Web site
Select correct option:

Personal Firewall
Password
PIN
ID


Quiz Start Time: 03:47 PM Time Left 87
sec(s)


Question # 5 of 10 ( Start time: 03:49:32 PM ) Total Marks: 1
Cryptography primarily consists of Two basic processes.
Select correct option:

True
False


Quiz Start Time: 03:47 PM Time Left 89
sec(s)


Question # 6 of 10 ( Start time: 03:50:03 PM ) Total Marks: 1
Which of the following assigns overall responsibility for the security of information
Select correct option:

Security Professionals
Executive Management
Data Owners
Option a and b



Quiz Start Time: 03:47 PM Time Left 89
sec(s)


Question # 7 of 10 ( Start time: 03:50:37 PM ) Total Marks: 1
Wireless computing devices are not subject to viruses.
Select correct option:

True
False

Quiz Start Time: 03:47 PM Time Left 89
sec(s)


Question # 8 of 10 ( Start time: 03:51:36 PM ) Total Marks: 1
When voltage that is received does not stay stable is referred as:
Select correct option:

power factor
power game
power dissipation
power fluctuation


Quiz Start Time: 03:47 PM Time Left 89
sec(s)


Question # 9 of 10 ( Start time: 03:53:07 PM ) Total Marks: 1
The first step in a successful attack against availability or confidentiality of information may be the violation of ______________.
Select correct option:

Completeness constraints
Consistency
Integrity
Reliability



Quiz Start Time: 03:47 PM Time Left 89
sec(s)


Question # 10 of 10 ( Start time: 03:54:04 PM ) Total Marks: 1
Worms can destroy data and programs as well as disrupt or even halt the operation of computer networks.
Select correct option:

True
False



Question # 1 of 10 ( Start time: 08:40:59 PM ) Total Marks: 1
A person either Hacker or Hacktivist or cracker is actually an intruder.
Select correct option:



True

False



Question # 2 of 10 ( Start time: 08:42:21 PM ) Total Marks: 1
Measuring technical assessment of a computing system is known as:
Select correct option:



security plan

security measures

security audit

security lapse



Question # 3 of 10 ( Start time: 08:43:32 PM ) Total Marks: 1
Due to unauthorized changes in data, its ___________ is lost.
Select correct option:



Sharing

Consistency

Integrity

Redundancy



Question # 4 of 10 ( Start time: 08:44:53 PM ) Total Marks: 1
Which of the following can be used together with access controls to identify and provide information about users suspected of improper modification of data
Select correct option:



Control Log

Audit Trial

Audit control

Control Trial



Question # 5 of 10 ( Start time: 08:46:13 PM ) Total Marks: 1
When voltage that is received does not stay stable is referred as:
Select correct option:



power factor

power game

power dissipation

power fluctuation


Question # 6 of 10 ( Start time: 08:47:33 PM ) Total Marks: 1
The protection of information from unauthorized disclosure explains the concept of system and data ______________.
Select correct option:



Completeness

Consistency

Reliability

Confidentiality



Question # 7 of 10 ( Start time: 08:48:35 PM ) Total Marks: 1
A sniffer forges the return address of an e-mail so that the e-mail message appears to come from someone other than the sender.
Select correct option:



True

False






Question # 8 of 10 ( Start time: 08:49:55 PM ) Total Marks: 1
There are typically four kinds of audit records
Select correct option:



True

False




Question # 9 of 10 ( Start time: 08:51:22 PM ) Total Marks: 1
Which of the following assigns overall responsibility for the security of information
Select correct option:



Security Professionals

Executive Management

Data Owners

Option a and b





Question # 10 of 10 ( Start time: 08:52:07 PM ) Total Marks: 1
Which of the following usually contain records describing system events, application events, or user events?
Select correct option:



An event-oriented log

A record of every keystroke

Option a and b

None of these

by VUsolutions

Mkt610 GDB solution

Wednesday, February 17, 2010 Posted In Edit This
Social CRM is a method to potentially connect with customers to provide distinct products and services at minimum cost.

How do you think that social CRM can be a next big thing in business processes while relating broader aspects of CRM studied in your whole course?

Solution:

First of all what is Social CRM? Well, first let’s take a look at what has happened to get from CRM to Social CRM. The difference between these two is just one word, social. Social brings a new element into CRM because now instead of just dealing with data and information we are dealing with conversations and relationships. These conversations and relationships take place not just from company to consumer but also from consumer to consumer.so we can say that CRM can be a next big thing in business processes while relating broader aspects of CRM.

Back to home VUsolutions

Shaadi.com: Just create ur account & find ur partner or EARN money, its reall & EASY

VUsolutions Followers (Join NOW and Get Extra Benefits)

Install LATEST toolbar having lot of features - GET solutions on Desktop

toolbar powered by Conduit
Caliplus 300x250 NoFlam VitoLiv 468x60 GlucoLo