Skip to main content

::: vuaskari.com ::: CS507 Online Quiz#4 Lecture# 29 to 35 January 13, 2012

Assalamu Alaykum Warahmatullahi WaBarakatuhu,

 

Tricking people into revealing their password by pretending to be legitimate users or members of a company in need of information is called

Select correct option:

Social Engineering 

Snooping

Spoofing

Spamming

 

 

 

Which of the following are responsible for providing independent assurance to management on the appropriateness of the security objectives?

Select correct option:

Information Systems Auditors  

Executive Management

Security Managers

Data owners

 

 

Which of the following carry characteristics of specialization?

Select correct option:

Sub classes  

Sub Interfaces

Sub objects

super set

 

 

 

 

Which of the following may include program code of application softwares, technical manuals, user manuals etc

Select correct option:

Documentation  

Audit Trial

Control Trial

None of these options

 

 

The first PC virus was a boot sector virus created in _________

Select correct option:

UK

USA

India

Pakistan 

 

 

 

We have to secure our systems in such fashion that possibilities of having bugs are reduced

Select correct option:

True  

False

 

 

 

Bug is an internal malfunction of the software.

Select correct option:

True 

False

 

 

 

Cryptogram is used in ____________

Select correct option:

LAN

WAN

Internet

All of the above  

 

_____________ protects the web server by controlling all traffic between the internet and the web server.

Select correct option:

Antivirus

Hub

Firewall  

Modem

 

 

Software that is developed through OOAD is easy to test due to the use of _________.

Select correct option:

Real time modeling

Usability features

Modular approach  

Procedural approach

 

In information security, integrity means that data cannot be modified undetectably

Select correct option:

True 

False

--
We say, "Be one as Pakistani Nation and grow up for Pakistan's Future". Wish you all the best. Join www.vuaskari.com,
To post to this group, send email to vuaskari_com@googlegroups.com
Visit these groups:
This (Main) Group:http://groups.google.com/group/vuaskari_com?hl=en?hl=en
MIT/MCS Group: http://groups.google.com/group/vu_askarimit?hl=en?hl=en
HRM Group: http://groups.google.com/group/askari_hrm?hl=en?hl=en
Banking Group: http://groups.google.com/group/askari_banking?hl=en?hl=en
Management: https://groups.google.com/group/vuaskari_mgt?hl=en
Marketing: https://groups.google.com/group/vuaskari_mkt?hl=en
MIS Group: http://groups.google.com/group/askari_mis?hl=en

Comments

Popular posts from this blog

Updating our Google Account inactivity policy

Every day Google works hard to keep you and your private information safe and secure by preventing unauthorized access to your Google Account with our built-in security protections. And keeping you safe means having strong privacy practices across our products that minimize how long we store your personal files and any data associated with them. We want to protect your private information and prevent any unauthorized access to your account even if you're no longer using our services. Therefore, we are updating the inactivity period for a Google Account to two years across all our products and services. This change starts rolling out today and will apply to any Google Account that's been inactive, meaning it has not been signed into or used within a two-year period. An inactive account and any content in it will be eligible for deletion from December 1, 2023. What this means for you: These changes do not impact you unless you h...

Re: ::: vuaskari.com ::: CS408 - FINAL TERM SUBJECTIVE WITH REFERENCE SOLVED BY UMAIR SAULAT

GREAT WORK On Wed, Feb 20, 2013 at 11:30 PM, Umair Saulat < saulat.umair@gmail.com > wrote: CS408- Human Computer Interaction Solved Subjective Fall Semester 2012   QNo.1    it has been observed that most computer users use menu option for input instead of keyboard accelerator. What is the reason behind it? (2 Marks) Answer:- 1.        Menu options are easier to find. 2.        You don't have to memories the keys for menu option but for key board accelerators you have to memories them REF:: Handouts Page No. 127   QNo.2    Define active intervention.  (2 Marks) Answer:- Active intervention with the participant and actively probes the participant understands of whatever is being tested. REF:: Handouts Page No. 276 QNo.3    what is Ubiquitous Computing? (2 Marks) Answer:- The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indi...

[vu-students] Urdu Love Letters ............ ahahahahahhahahah

  The One & Only .......... IRFAN. Italy. http://groups.yahoo.com/group/p_se_poetry   -- You received this message because you are subscribed to the Google Groups "VU Students" group. To post to this group, send email to vu-students@googlegroups.com To unsubscribe from this group, send email to vu-students+unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/vu-students?hl=en_PK?hl=en