Computer Knowledge MCQ-251

This is a documents that states in writing how a company plans to protect the company’s physical and IT assets :

(A) Data Encryption Standard
(B) Security Policy
(C) Public Key Certificate
(D) Access Control List
(E) Copyright

Which are examples of IPS (Intrusion Protection system)?

(A) Solar Open Design Wall
(B) Gr security
(D) All of the above
(E) None of these

Which of the following are methods of Network Security?

(B) Encryption
(C) Honey pots
(D) Firewall
(E) All of the above

This is a set of related programs, usually located at a network gateway server,that protects the resources of a private network from other network:

(A) Firewall
(B) Root kit
(C) Sandbox
(D) Password Cracker
(E) None of these

What happens if you digitally sign and inject footer on an e-mail message in the order?

(A) Nothing
(B) The message won’t be sent.
(C) The footer will invalidate the signature.
(D) The footer will be illegible.
(E) None of these

This is a class of programs that searches your hard drive and floppy disks for any known or potential virus:

(A) Intrusion Detection
(B) Security identifier
(C) Antigen
(D) Probe
(E) Antivirus software

Which of them is not an input control type?

(A) Unintentional entry of wrong data
(B) Preparation of false input forms
(C) Intentional entry of fraudulent data
(D) Use of unauthorized Input forms
(E) Password secrecy

Which cannot assure data accuracy in an application?

(A) Control total
(B) Limit and reasonableness test
(C) Echo checking
(D) All of these
(E) None of these

A computer works faster with

(B) Mouse
(C) Keyboard V
(D) All of these
(E) None of these

Which form of job scheduling uses triggers?

(A) Manual scheduling
(B) Distributed scheduling
(C) Mainframe scheduling
(D) Automated scheduling
(E) None of these

MICR devices can read:

(A) Letters
(B) Numbers
(C) Both of these
(D) All of these
(E) None of these

Auxiliary storage consists of

(A) Magnetic tapes
(B) CDs
(C) Both of these
(D) All of these
(E) None of these

Who can provides access rights to users?

(A) Data custodian
(B) Data owner
(C) The data base administrator
(D) Management
(E) None of these

Security policy of an organization need not have

(A) The overall security philosophy of the organization
(B) The authorization procedure for accessing data
(C) Security awareness program
(D) Highlights and identity of the sensitive security features
(E) None of these

Incase of a virus getting into computer, which of the following will help?

(A) Encryption
(C) Police complaint
(D) All of these
(E) None of these

Which of the following do you think is NOT necessary for computerization system in a bank?

(A) Effective customer service
(B) Effective back office integration
(C) Focus on manual records
(D) All of these
(E) None of these