Virtual Position Forum
Please register to watch content in detail
Thanks
Admin virtual position


Join the forum, it's quick and easy

Virtual Position Forum
Please register to watch content in detail
Thanks
Admin virtual position
Virtual Position Forum
Would you like to react to this message? Create an account in a few clicks or log in to continue.

My CS507 Online Quiz No. 1

View previous topic View next topic Go down

GMT + 3 Hours My CS507 Online Quiz No. 1

Post by Chaand jee Wed Oct 31, 2012 8:58 pm

Question
Tricking
or members of a company in need of information is called
Select
Social
Snooping
Spoofing
Spamming
Quiz
sec(s)
Question
Which
developing
Select
Risk Management
Executive
Audit Trial
None
Risk Management is the process of measuring, or assessing risk and then developing
strategies to manage the risk.
Question # 3 of 10 ( Start time: 05:21:48 PM ) Total Marks: 1
The
SECTORS
is
Select
Logical Threat
Physical Threat
option
None
Logical Threat For example the virus or bug being installed to corrupt data
or software might create BAD SECTORS on the hard drive, leading to its preferable
removal from the computer.
Quiz
sec(s)
Question
Different
to
Select
Security
Authenticity
Integrity
None
“Different levels and types of security may be required to address the risks to
information. Security levels and associated costs must be compatible with the value
of the information.”
Question
There
Select
Three
Four
There are typically two kinds of audit records: (1) An event-oriented log (2) A record
of every keystroke
Question # 6 of 10 ( Start time: 05:25:04 PM ) Total Marks: 1
Security
permission
Select
True
False
Access controls focus on the correct identification of the user seeking permission to
access the system. There can be various sources of identifying and authenticating
the user.
Question # 7 of 10 ( Start time: 05:26:11 PM ) Total Marks: 1
Implementation
systems.
Select
Information
Business
System
Management
Implementation of controls is a critical security feature of information systems
Question
In risk management a corporate level facilitator perform
Select
Information
Documentation
Risk assessments
Control
the overall risk assessment process and reviewing results of risk assessments in the
hardware and software systems from the perspective of offering a better, reliable and
risk free product.
Question # 9 of 10 ( Start time: 05:29:21 PM ) Total Marks: 1
Which
Information technology infrastructure
Select
An
information
Option a and b both
None
An information technology (IT) audit or information systems (IS) audit is an
examination of the controls within an entity's Information technology infrastructure.
Question
Access
operating
Select
True
False
Chaand jee
Chaand jee
Monstars
Monstars

Leo Dragon
Posts : 19
Join date : 2011-02-10
Age : 36

Back to top Go down

View previous topic View next topic Back to top

- Similar topics

Permissions in this forum:
You cannot reply to topics in this forum