My Cs507 Quiz3 by Soban
My Cs507 Quiz3 by Soban
My Cs507 Quiz3 by Soban
VU And COMPANY.
(http://groups.google.com.pk/group/vu-and-company?hl=en)
Muhammad Soban 0333-7637637
Question # 1 of 10 ( Start time: 12:43:01 PM ) Total Marks: 1 __________ are installed at the point where network connections enter a site. Select correct option: Antivirus Bridges Routers Firewalls
Question # 2 of 10 ( Start time: 12:43:59 PM ) Total Marks: 1 Which of the following are normally skilled programmers, and have been known to crack system passwords, with quite an ease? Select correct option: Hackers Crackers Hacktivists Intruders
Question # 3 of 10 ( Start time: 12:45:01 PM ) Total Marks: 1 Documentation may include program code of application softwares, technical manuals, user manuals e Select correct option: True False
Question # 4 of 10 ( Start time: 12:45:47 PM ) Total Marks: 1 Audit Trial is a weakness that can be accidentally triggered or intentionally exploited. Select correct option: Trues False
Question # 5 of 10 ( Start time: 12:46:28 PM ) Total Marks: 1 Which of the following is the secret character string that is required to log onto a computer system? Select correct option: ID PIN PASSWORD none of these
Question # 6 of 10 ( Start time: 12:47:06 PM ) Total Marks: 1 A personal identification number (PIN) is a secret shared between a user and a system that can be used to authenticate the user to the system. Select correct option: True False
Question # 7 of 10 ( Start time: 12:47:51 PM ) Total Marks: 1 An audit trail may record "before" and "after" images, also called Snapshots of records. Select correct option: True False
Question # 8 of 10 ( Start time: 12:48:28 PM ) Total Marks: 1 Traversing of a record of every keystroke, often called Select correct option: Physical Key Monitoring Logical Key Monitoring Keystroke Monitoring Primary Key Monitoring
Question # 9 of 10 ( Start time: 12:49:23 PM ) Total Marks: 1 Boot virus protection means ________________ based virus protection. Select correct option: Hardware Software Liveware Firmware
Question # 10 of 10 ( Start time: 12:50:12 PM ) Total Marks: 1 Which of the following network attacks involves probing for network information? Select correct option: Passive attacks Active attacks Masquerading Spoofing
To get the More entertain and Study related e-mail Kindly visit and Join the group. VU And COMPANY.
(http://groups.google.com.pk/group/vu-and-company?hl=en)
Muhammad Soban 0333-7637637