Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

My Cs507 Quiz3 by Soban

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4
At a glance
Powered by AI
The document discusses different cybersecurity concepts like firewalls, hackers, passwords, auditing, and network attacks.

The document discusses security threats like hackers, cracking passwords, and exploiting weaknesses in auditing.

Common authentication methods mentioned include passwords, PINs, and logging onto computer systems.

To get the More entertain and Study related e-mail Kindly visit and Join the group.

VU And COMPANY.
(http://groups.google.com.pk/group/vu-and-company?hl=en)
Muhammad Soban 0333-7637637

Question # 1 of 10 ( Start time: 12:43:01 PM ) Total Marks: 1 __________ are installed at the point where network connections enter a site. Select correct option: Antivirus Bridges Routers Firewalls

Question # 2 of 10 ( Start time: 12:43:59 PM ) Total Marks: 1 Which of the following are normally skilled programmers, and have been known to crack system passwords, with quite an ease? Select correct option: Hackers Crackers Hacktivists Intruders

Question # 3 of 10 ( Start time: 12:45:01 PM ) Total Marks: 1 Documentation may include program code of application softwares, technical manuals, user manuals e Select correct option: True False

Question # 4 of 10 ( Start time: 12:45:47 PM ) Total Marks: 1 Audit Trial is a weakness that can be accidentally triggered or intentionally exploited. Select correct option: Trues False

Question # 5 of 10 ( Start time: 12:46:28 PM ) Total Marks: 1 Which of the following is the secret character string that is required to log onto a computer system? Select correct option: ID PIN PASSWORD none of these

Question # 6 of 10 ( Start time: 12:47:06 PM ) Total Marks: 1 A personal identification number (PIN) is a secret shared between a user and a system that can be used to authenticate the user to the system. Select correct option: True False

Question # 7 of 10 ( Start time: 12:47:51 PM ) Total Marks: 1 An audit trail may record "before" and "after" images, also called Snapshots of records. Select correct option: True False

Question # 8 of 10 ( Start time: 12:48:28 PM ) Total Marks: 1 Traversing of a record of every keystroke, often called Select correct option: Physical Key Monitoring Logical Key Monitoring Keystroke Monitoring Primary Key Monitoring

Question # 9 of 10 ( Start time: 12:49:23 PM ) Total Marks: 1 Boot virus protection means ________________ based virus protection. Select correct option: Hardware Software Liveware Firmware

Question # 10 of 10 ( Start time: 12:50:12 PM ) Total Marks: 1 Which of the following network attacks involves probing for network information? Select correct option: Passive attacks Active attacks Masquerading Spoofing

To get the More entertain and Study related e-mail Kindly visit and Join the group. VU And COMPANY.
(http://groups.google.com.pk/group/vu-and-company?hl=en)
Muhammad Soban 0333-7637637

You might also like