Skip to main content

::: vuaskari.com ::: CS507 Online Quiz#4 Lecture# 29 to 35 January 13, 2012

Assalamu Alaykum Warahmatullahi WaBarakatuhu,

 

Tricking people into revealing their password by pretending to be legitimate users or members of a company in need of information is called

Select correct option:

Social Engineering 

Snooping

Spoofing

Spamming

 

 

 

Which of the following are responsible for providing independent assurance to management on the appropriateness of the security objectives?

Select correct option:

Information Systems Auditors  

Executive Management

Security Managers

Data owners

 

 

Which of the following carry characteristics of specialization?

Select correct option:

Sub classes  

Sub Interfaces

Sub objects

super set

 

 

 

 

Which of the following may include program code of application softwares, technical manuals, user manuals etc

Select correct option:

Documentation  

Audit Trial

Control Trial

None of these options

 

 

The first PC virus was a boot sector virus created in _________

Select correct option:

UK

USA

India

Pakistan 

 

 

 

We have to secure our systems in such fashion that possibilities of having bugs are reduced

Select correct option:

True  

False

 

 

 

Bug is an internal malfunction of the software.

Select correct option:

True 

False

 

 

 

Cryptogram is used in ____________

Select correct option:

LAN

WAN

Internet

All of the above  

 

_____________ protects the web server by controlling all traffic between the internet and the web server.

Select correct option:

Antivirus

Hub

Firewall  

Modem

 

 

Software that is developed through OOAD is easy to test due to the use of _________.

Select correct option:

Real time modeling

Usability features

Modular approach  

Procedural approach

 

In information security, integrity means that data cannot be modified undetectably

Select correct option:

True 

False

--
We say, "Be one as Pakistani Nation and grow up for Pakistan's Future". Wish you all the best. Join www.vuaskari.com,
To post to this group, send email to vuaskari_com@googlegroups.com
Visit these groups:
This (Main) Group:http://groups.google.com/group/vuaskari_com?hl=en?hl=en
MIT/MCS Group: http://groups.google.com/group/vu_askarimit?hl=en?hl=en
HRM Group: http://groups.google.com/group/askari_hrm?hl=en?hl=en
Banking Group: http://groups.google.com/group/askari_banking?hl=en?hl=en
Management: https://groups.google.com/group/vuaskari_mgt?hl=en
Marketing: https://groups.google.com/group/vuaskari_mkt?hl=en
MIS Group: http://groups.google.com/group/askari_mis?hl=en

Comments

Popular posts from this blog

Re: ::: vuaskari.com ::: CS408 - FINAL TERM SUBJECTIVE WITH REFERENCE SOLVED BY UMAIR SAULAT

GREAT WORK On Wed, Feb 20, 2013 at 11:30 PM, Umair Saulat < saulat.umair@gmail.com > wrote: CS408- Human Computer Interaction Solved Subjective Fall Semester 2012   QNo.1    it has been observed that most computer users use menu option for input instead of keyboard accelerator. What is the reason behind it? (2 Marks) Answer:- 1.        Menu options are easier to find. 2.        You don't have to memories the keys for menu option but for key board accelerators you have to memories them REF:: Handouts Page No. 127   QNo.2    Define active intervention.  (2 Marks) Answer:- Active intervention with the participant and actively probes the participant understands of whatever is being tested. REF:: Handouts Page No. 276 QNo.3    what is Ubiquitous Computing? (2 Marks) Answer:- The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indi

Updating our Google Account inactivity policy

Every day Google works hard to keep you and your private information safe and secure by preventing unauthorized access to your Google Account with our built-in security protections. And keeping you safe means having strong privacy practices across our products that minimize how long we store your personal files and any data associated with them. We want to protect your private information and prevent any unauthorized access to your account even if you're no longer using our services. Therefore, we are updating the inactivity period for a Google Account to two years across all our products and services. This change starts rolling out today and will apply to any Google Account that's been inactive, meaning it has not been signed into or used within a two-year period. An inactive account and any content in it will be eligible for deletion from December 1, 2023. What this means for you: These changes do not impact you unless you h

Learn more about our updated Terms of Service

stargthb@gmail.com On January 5, 2022, we're making some changes to our Terms of Service. These changes won't affect the way you use Google services, but they'll make it easier for you to understand what to expect from Google — and what we expect from you — as you use our services. You can review the new terms here . At a glance, here's what this update means for you: More clarity on what you can expect from Google and what we expect from you : We're providing more examples to describe the mutually respectful conduct that we expect from all our users. Improved readability : While our terms remain a legal document, we've done our best to make them easier to understand, including reorganizing some topics so that they're easier to find. If you use Family Link to manage a Google Account for someone else, please take some time to talk to them about these changes. Thank you for using Google!