Professional Documents
Culture Documents
Trojan horse
Logic bomb
virus
Question No. 5 Marks 10
which of the following malicious prog do not replicate authomatically ?
Options
Trojan Horse
Virus
Worm
Zombie
Question No. 6 Marks 10
......................Programs can be used to accomplish functions indirectly th
at an
unauthorized user not accomplish directly
Options
Zombie
worm
Trojan horse
Logic Bomb
Question No. 7 Marks 10
state whether true of falls 1.A worm mails a copy of itself to other system 2.a
worm executes a copy of itself on another system
Options
true, false
false, true
true, true
false, false
Question No. 8 Marks 10
............ are used in denial of service attacks, typically against targeted w
eb sites
Options
Worm
Zombie
Virus
Trojan horse
Question No. 9 Marks 10
..................... is a form of virus explicitely designed to hide itself fro
m detection
by antivirus software
Options
Stealth Virus
Polymorphic virus
Parastic virus
macro virus
Question No. 10 Marks 10
State whether the following statement is true 1. A macro virus is paltform
indepecent 2. Macro viruese infect documents, not executabel portions of code
Options
1 only
2 only
both 1 & 2
none
Question No. 11 Marks 10
direct marketing
fund raising
information reselling
government agencies
Question No. 19 Marks 10
The first step in developing a Business Continuity Plan (BCP) is developing a:
Options
Business Impact Analysis
Risk Analysis Sheet
Risk Mitigation Document
Risk Assess ment Sheet
Question No. 20 Marks 10
An analysis of threats based on impacts and prioritizing business disruptions ba
sed
on severity and occurrence comes under the second step of developing a BCP,
which is:
Options
Risk Monitoring
Risk Assessment
BIA
Risk Management
Question No. 21 Marks 10
Testing the BCP regularly comes under the phase:
Options
Risk Assessment
BIA
Risk Monitoring
Risk Management
Question No. 22 Marks 10
Effectiveness of a BCP can be validated through
Options
Monitoring
Assessment
Feedback
Testing
Question No. 23 Marks - 10
By using "__________" option in Windows, you can limit the ability of users and
groups to perform various actions by assigning permissions.
Options
Network and Internet
Hardware and Sound
Programs
Local Users and Groups
Question No. 24 Marks 10
A Windows NT ______ is the administrative unit of directory services.
Options
Directory
File
Domain
Folder
Question No. 25 Marks 10
Domains, Folders, Objects are a part of ________ structure of Windows OS.
Options
Physical
Logical
Both Physical and Logical
None of the above
Encrypting File System (EFS) is a feature of:
Options
Microsoft Windows
iOS
Linux
Unix
Question No. 27 Marks - 10
Cyber-attack is a kind of:
Options
Natural Disaster
Man-Made disaster
Both
None of the above
Question No. 28 Marks 10
Which password management feature ensures that a user can not re use a password
for a specific time?
Options
Account Locking
Password Verification
Password History
Password Ageing
Question No. 29 Marks 10
Composing hard-to-guess passwords is a good practice.
Options
FALSE
May or May not be TRUE
TRUE
Not Sure
Question No. 30 Marks 10
Study of encryption algorithms in order to find weaknesses in the system so as t
o
retrieve plain text from cipher text without knowing the key/algorithm.
Options
Cryptography
Key Analysis
Algorithm Analysis
Cryptanalysis
Question No. 31 Marks 10
Capital 'A' in CIA triangle stands for:
Options
Availability
Authorization
Authentication
Algorithm
Question No. 32 Marks 10
When the sender and receiver do not have a possibility of denying sending or
receiving data, it is called the principle of:
Options
Confidentiality
Non-repudiation
Repudiation
Integrity
Unauthorized Access
Malicious Code
Network Attack
Password Attack
Question No. 40 Marks 10
A secret entry point in the code which could be exploited by malicious users is
called:
Options
Virus
Worm
Trapdoor
Trojan Horse
Contact www.solvedcare.com for best and lowest cost solution or email solvedcare
@gmail.com