This is a documents that states in writing how a company plans to protect the company’s physical and IT assets :
(A) Data Encryption Standard
(B) Security Policy
(C) Public Key Certificate
(D) Access Control List
(E) Copyright
Which are examples of IPS (Intrusion Protection system)?
(A) Solar Open Design Wall
(B) Gr security
(C) LOMAC
(D) All of the above
(E) None of these
Which of the following are methods of Network Security?
(A) VPN
(B) Encryption
(C) Honey pots
(D) Firewall
(E) All of the above
This is a set of related programs, usually located at a network gateway server,that protects the resources of a private network from other network:
(A) Firewall
(B) Root kit
(C) Sandbox
(D) Password Cracker
(E) None of these
What happens if you digitally sign and inject footer on an e-mail message in the order?
(A) Nothing
(B) The message won’t be sent.
(C) The footer will invalidate the signature.
(D) The footer will be illegible.
(E) None of these
This is a class of programs that searches your hard drive and floppy disks for any known or potential virus:
(A) Intrusion Detection
(B) Security identifier
(C) Antigen
(D) Probe
(E) Antivirus software
Which of them is not an input control type?
(A) Unintentional entry of wrong data
(B) Preparation of false input forms
(C) Intentional entry of fraudulent data
(D) Use of unauthorized Input forms
(E) Password secrecy
Which cannot assure data accuracy in an application?
(A) Control total
(B) Limit and reasonableness test
(C) Echo checking
(D) All of these
(E) None of these
A computer works faster with
(A) GUI
(B) Mouse
(C) Keyboard V
(D) All of these
(E) None of these
Which form of job scheduling uses triggers?
(A) Manual scheduling
(B) Distributed scheduling
(C) Mainframe scheduling
(D) Automated scheduling
(E) None of these
MICR devices can read:
(A) Letters
(B) Numbers
(C) Both of these
(D) All of these
(E) None of these
Auxiliary storage consists of
(A) Magnetic tapes
(B) CDs
(C) Both of these
(D) All of these
(E) None of these
Who can provides access rights to users?
(A) Data custodian
(B) Data owner
(C) The data base administrator
(D) Management
(E) None of these
Security policy of an organization need not have
(A) The overall security philosophy of the organization
(B) The authorization procedure for accessing data
(C) Security awareness program
(D) Highlights and identity of the sensitive security features
(E) None of these
Incase of a virus getting into computer, which of the following will help?
(A) Encryption
(B) NORTON
(C) Police complaint
(D) All of these
(E) None of these
Which of the following do you think is NOT necessary for computerization system in a bank?
(A) Effective customer service
(B) Effective back office integration
(C) Focus on manual records
(D) All of these
(E) None of these