Information Security Risk-1

$7.50

SKU: AMSEQ-116 Category:

Part – A

Q1. What are the 4 jobs of an operating system?
Q2. How does the Operating system keep track of the different disk drives?
Q3. What kind of natural hazards are not normally insurable?
Q4. Describe the trends in disaster management.
Q5. What is network security and how does it protect you?
Q6. What is the Microsoft Encrypting File System and what are some of its features?
Q7. What is computer Security?
Q8. Discuss the concept of Local Security Policies.

Part – B
Q1. What is the user authentication concept?
Q2. Discuss the key mechanism of Firewall.
Q3. Define the term “Disaster” and describe its classification.

Part – C

Q1: In computer security…………. means that the computer sytem assets can be modified only by authorized parties
Confidentiality
Integrity
Availability
Authencity

Q2: A computer security……………. means that the information in acomputer sytem only can be accessible for reading by authorized parties
confidentiality
Integrity
Availibility
Authencity

Q3: Which of the following is independent malicious program that need not any host programe ?
Trap Doors
Trojan horse
virus
worm

Q4: The ……………….. is code embedded in some legitimate program that is set to explode when certain conditions are met
Trap doors
Trojan horse
Logic bomb
virus

Q5: which of the following malicious prog do not replicate authomatically ?
Trojan Horse
Virus
Worm
Zombie

Q6: ………………….Programs can be used to accomplish functions indirectly that an unauthorized user not accomplish directly
Zombie
worm
Trojan horse
Logic Bomb

Q7: state whether true of falls 1.A worm mails a copy of itself to other system 2.a worm executes a copy of itself on another system
true, false
false, true
true, true
false, false

Q8: ………… are used in denial of service attacks, typically against targeted web sites
Worm
Zombie
Virus
Trojan horse

Q9: ………………… is a form of virus explicitely designed to hide itself from detection by antivirus software
Stealth Virus
Polymorphic virus
Parastic virus
macro virus

Q10: State whether the following statement is true 1. A macro virus is paltform indepecent 2. Macro viruese infect documents, not executabel portions of code
1 only
2 only
both 1 & 2
none

Q11: The type of auto executing macros, in microsoft word is/are
auto execute
auto macro
command macro
all of the above

Q12: In……………….. the virus places an identical copy of itself into other programs or into certain sytem areas on the disk
Dormat phase
Propagation phase
Triggering Phase
execution phase

Q13: In the world of computing, the essential element that controls how computers are used is
ethics
legal laws
security requiremnts
business demands

Q14: The guidelines for the morally acceptable use of computers in socitey are
computer ethics
privacy
morality
legal system

Q15: The issues that deal with the collection and use of data about individuals is
access
property
accuracy
privacy

Q16: The ethical issue concerned with the correctness of data collected is
access
property
Exactness
privacy

Q17: The ethical issue that involves who is able to read and use data is
access
property
accuracy
privacy

Q18: The vast industry involves the gathering and selling of personal data is
direct marketing
fund raising
information reselling
government agencies

Q19: The first step in developing a Business Continuity Plan (BCP) is developing a:
Business Impact Analysis
Risk Analysis Sheet
Risk Mitigation Document
Risk Assess ment Sheet

Q20: An analysis of threats based on impacts and prioritizing business disruptions based on severity and occurrence comes under the second step of developing a BCP, which is:
Risk Monitoring
Risk Assessment
BIA
Risk Management

Q21: Testing the BCP regularly comes under the phase:
Risk Assessment
BIA
Risk Monitoring
Risk Management

Q22: Effectiveness of a BCP can be validated through
Monitoring
Assessment
Feedback
Testing

Q23: By using “__________” option in Windows, you can limit the ability of users and groups to perform various actions by assigning permissions.
Network and Internet
Hardware and Sound
Programs
Local Users and Groups

Q24: A Windows NT ______ is the administrative unit of directory services.
Directory
File
Domain
Folder

Q25: Domains, Folders, Objects are a part of ________ structure of Windows OS.
Physical
Logical
Both Physical and Logical
None of the above

Q26: Encrypting File System (EFS) is a feature of:
Microsoft Windows
iOS
Linux
Unix

Q27: Cyber-attack is a kind of:
Natural Disaster
Man-Made disaster
Both
None of the above

Q28: Which password management feature ensures that a user can not re use a password for a specific time?
Account Locking
Password Verification
Password History
Password Ageing

Q29: Composing hard-to-guess passwords is a good practice.
FALSE
May or May not be TRUE
TRUE
Not Sure

Q30: Study of encryption algorithms in order to find weaknesses in the system so as to retrieve plain text from cipher text without knowing the key/algorithm.
Cryptography
Key Analysis
Algorithm Analysis
Cryptanalysis

Q31: Capital ‘A’ in CIA triangle stands for:
Availability
Authorization
Authentication
Algorithm

Q32: When the sender and receiver do not have a possibility of denying sending or receiving data, it is called the principle of:
Confidentiality
Non-repudiation
Repudiation
Integrity

Q33: While Symmetric key cryptography utilizes ___ key(s) for encryption, the asymmetric key cryptography uses ___ key(s).
1,2
2,1
1,1
2,3

Q34: A software application that monitors network and system activities for malicious content and policy violations is termed as:
Firewall
Anti-Virus
Anti-Malware
Intrusion Detection System

Q35: During an earthquake in Nepal, many computers were destroyed with significant data. This is a kind of:
Accidental Error
Malicious use
Unauthorized access
Physical Threat

Q36: Process to eliminate means of attack by patching vulnerabilities and turning off inessential services is called:
Malicious Code elimination
Attack Prevention Mechanism
Hardening
Disaster Management

Q37: The local security policy of a system is a set of information regarding the security of a local computer. It includes trusted _____, ______ accounts and ______ assigned to the accounts.
Users, domain, privileges
Domains, user, privileges
Privileges, user, domains
None of the above

Q38: Administrator and Guest are examples of ____ user accounts.
Default
Explicit
Implicit
None of the above

Q39: Rahul, an IT Engineer, while working on his system, noticed that a new Notepad tab has popped out and a message is being typed. This is an example of
Unauthorized Access
Malicious Code
Network Attack
Password Attack

Q40: A secret entry point in the code which could be exploited by malicious users is called:
Virus
Worm
Trapdoor
Trojan Horse

Reviews

There are no reviews yet.

Be the first to review “Information Security Risk-1”

Your email address will not be published. Required fields are marked *

PlaceholderInformation Security Risk-1
$7.50