Admin Admin
Posts : 638 Points : 2155 Reputation : 19 Join date : 2010-05-15 Age : 36 Location : islamabad
| Subject: CS507 QUIZ Thu Jul 22, 2010 9:20 pm | |
| - Code:
-
Question Tricking or members of a company in need of information is called Select Social Snooping Spoofing Spamming Quiz sec(s) Question Which developing Select Risk Management Executive Audit Trial None Risk Management is the process of measuring, or assessing risk and then developing strategies to manage the risk. Question # 3 of 10 ( Start time: 05:21:48 PM ) Total Marks: 1 The SECTORS is Select Logical Threat Physical Threat option None Logical Threat For example the virus or bug being installed to corrupt data or software might create BAD SECTORS on the hard drive, leading to its preferable removal from the computer. Quiz sec(s) Question Different to Select Security Authenticity Integrity None “Different levels and types of security may be required to address the risks to information. Security levels and associated costs must be compatible with the value of the information.” Question There Select Three Four There are typically two kinds of audit records: (1) An event-oriented log (2) A record of every keystroke Question # 6 of 10 ( Start time: 05:25:04 PM ) Total Marks: 1 Security permission Select True False Access controls focus on the correct identification of the user seeking permission to access the system. There can be various sources of identifying and authenticating the user. Question # 7 of 10 ( Start time: 05:26:11 PM ) Total Marks: 1 Implementation systems. Select Information Business System Management Implementation of controls is a critical security feature of information systems Question In risk management a corporate level facilitator perform Select Information Documentation Risk assessments Control the overall risk assessment process and reviewing results of risk assessments in the hardware and software systems from the perspective of offering a better, reliable and risk free product. Question # 9 of 10 ( Start time: 05:29:21 PM ) Total Marks: 1 Which Information technology infrastructure Select An information Option a and b both None An information technology (IT) audit or information systems (IS) audit is an examination of the controls within an entity's Information technology infrastructure. Question Access operating Select True False
| |
|