CS507 Solved Quiz Dated

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 11

CS507 Quiz Dated 30-07-2010

1. Which of the following systems need a comprehensive definition of the known


and expected behavior of systems?
Select correct option:

Firewalls
Network-based IDS
Signature-based IDS
Statistical-based IDS

Ref: Statistical-based: These systems need a comprehensive definition of the known and
expected behavior of systems.

2. Risk impact assessment should focus on consequences affecting _____


Select correct option:

Planning, resources, cost, schedule


Marketing, costing, staffing
Performance, cost, schedule
Business, technology, process

Reference

3. An intruder carry out unauthorized activity by impersonating a legitimate user of


the system incase of________________.
Select correct option:

Eavesdropping
Masquerading
Piggybacking
Spoofing

Ref: Masquerading – involves carrying out unauthorized activity by impersonating a


legitimate user of the system.

4. ________ are installed at the point where network connections enter a site.
Select correct option:

Antivirus
Bridges
Routers
Firewalls

Ref: Firewalls are defined as a device installed at the point where network connections
enter a site; they apply rules to control the type of networking traffic flowing in and out.
5. Incase of __________, an intruder fools a user into thinking they are interacting
with the operating system.
Select correct option:

Spoofing
Piggybacking
Eavesdropping
Trojan horse

Ref: Spoofing – A penetrator fools users into thinking they are interacting with the
operating system. He duplicates logon procedure and captures pass word.

6. Which of the following when together, break down the geographical and time
barriers?
Select correct option:

Mobility and Speed


Reachability and Accessibility
Mobility and reachability
Remote access and Speed

Ref: Mobility implies that the Internet access travels with the customers. M-commerce is
appealing because wireless offers customers information from any location. This enables
employees to contact the office from anywhere they happen to be or customer.
Reachability means that people can be contacted at any time, which most people see as a
convenience of modern life. These two characteristics – mobility and reachability break
the geographical and time barriers.

7. Internet is vulnerable to attacks because of its ___________


Select correct option:

scope
nature
global access
speed

Ref: The nature of the internet makes it vulnerable to attack.

8. What would affect the impact’s scope if a risk does occur?


Select correct option:

Risk cost
Risk timing
Risk scope
Risk resources
9. Under which of the following agreement, two or more organizations agree to
provide backup facilities to each other in case of one suffering from a disaster.
Select correct option:
Mutual
Cooperative
Reciprocal
Joint

Ref: Reciprocal Agreement_ Two or more organization might agree to provide backup
facilities to each other in the event of one suffering a disaster. This backup option is
relatively cheap, but each participate must maintain sufficient capacity to operate
another’s critical systems. Reciprocal agreements are often informal in nature.

10. Risks are rated by ____


Select correct option:

Probability and impact


Probability and cost
Probability and size
Probability and exposure

Reference

11. Which of the following apply rules to control the type of networking traffic
flowing in and out?
Select correct option:

Data analyzers
Firewall
Antivirus
Modem

Ref: Firewalls are defined as a device installed at the point where network connections
enter a site; they apply rules to control the type of networking traffic flowing in and out.
The purpose is to protect the Web server by controlling all traffic between the Internet
and the Web server.

12. Automated tools can be used to


Select correct option:

On site reviews
Information elicitation
Threat identification
Maintain system integrity
13. Which of the following is applicable to environments with stable demand
patterns?
Select correct option:

Built to order supply chain


JIT
Made to store supply chain
Continuous replenishment supply chain

Ref: Continuous Replenishment – focuses on constant replacement of inventory by


working closely with suppliers. Applicable to environments with stable demand patterns.

14. Data packets are routed across a network with the help of_______________.
Select correct option:

FTP protocol
HTTP protocol

TCP protocol
Internet Protocol

Ref: The Internet Protocol is designed solely for the addressing and routing of data
packets across a network.

15. Which of the following involves intercepting communications between the


operating system and the user?
Select correct option:

Eavesdropping
Masquerading
Piggybacking
Spoofing

Ref: Piggybacking – involves intercepting communications between the operating


system and the user and modifying them or substituting new messages.

16. ________ site backup is an appropriate choice for organizations if fast recovery is
critical.
Select correct option:

Hot
Cold
Cool
Warm

Ref: Hot sites

If fast recovery is critical, an organization might need hot-site backup. All hardware and
operations facilities will be available at the hot site. In some cases, software, data, and
supplies might also be stored there. Hot sites are expensive to maintain. They usually are
shared with other organizations that have same hot site needs.

17. Which of the following phase determines the adverse impact resulting from a
successful threat exercise of vulnerability?
Select correct option:

Risk resilience
Monitoring threats
Likelihood determination
Impact analysis

Ref: Impact analysis

The next major step in measuring level of risk is to determine the adverse impact
resulting into a successful,exercise of vulnerability.

18. Threat likelihood is determined to use in____


Select correct option:

Impact analysis
Assessment process
Control recommendation
Vulnerability identification
19. __________ supply chain segment includes all the processes to transform inputs
to outputs.
Select correct option:

Downstream
Internal
Upstream
Middle stream

Ref: Upstream supply chain segment – includes the organization’s first-tier suppliers

(manufacturers and assemblers). The major activities are purchasing and shipping.

• Internal supply chain segment – includes all the processes to transform inputs to
outputs.

• Downstream supply chain segment – includes distributing, delivering to customer and


final consumption of the product.

20. Threat identification can be verified using


Select correct option:

Threat statement
Threat source
Threat action plan
Threat impact analysis
Ref: Information is used as an input to determine and identify what kind of threats the
system is exposed to history of system attack, data from intelligence agencies. The out
put of this phase is a threat statement identifying and defining threats.

21. ______________ refers to the structured transmission of data between


organizations via electronic means.
Select correct option:

DEI
EDI
CDI
IDE

Ref: EDI is a set of standards for structuring information to be electronically exchanged


between and within businesses, organizations, government entities and other groups.

22. ___________ refers to the constant replacement of inventory by working closely


with suppliers.
Select correct option:

Continuous replenishment
Made to store
JIT
Built to order

Ref: Continuous Replenishment – focuses on constant replacement of inventory by


working closely with suppliers. Applicable to environments with stable demand patterns.

23. Firewalls ________ data packets which are sent between different physical
locations within an organization.
Select correct option:

facilitate
Encrypt
restrict
allow

Ref: Firewalls encrypt packets that are sent between different physical locations within
an organization by creating a VPN over the Internet.(Page NO.178)

24. An effective risk management strategy will need to address _____


Select correct option:

Business continuity planning


Risk avoidance
Risk monitoring
All of these

Reference

25. Which of the following is the act of secretly listening to the private conversation
of others without their consent?
Select correct option:

Eavesdropping
Spoofing
Masquerading
Piggybacking

Reference

26. Which of the following is not simply redesigning of certain input forms but also
includes changing of working practices?
Select correct option:

BPR
ERP
BRP
ERD

Ref: BPR was not simply of redesigning certain input forms but involved changed
practices of working. It involved change in human thought and approaches to their
routine, mundane tasks. This raised issues of Change Management.

27. Which of the following is in fact the risk mitigation process?


Select correct option:

Risk determination
Control recommendations
Control measures
Risk pliability

Ref: The control recommendations are the results of the risk assessment

process. The control recommendations is actually the risk mitigation process.

28. Which of the following refers to the online delivery of information for the
purpose of education, training and knowledge management etc?
Select correct option:

E-Banking
E-Commerce
E-Business
E-Learning

Ref: It is a web - enabled system that makes knowledge accessible to those who need it,
when they need it – anytime, anywhere. E-learning is useful for facilitating learning at
schools.

29. Internet protocol ____________ provide evidence on the delivery of messages.


Select correct option:

mostly
does not
does
up to some extent

Ref: The Internet Protocol is designed solely for the addressing and routing of data
packets across a network. It does not guarantee or provide evidence on the delivery of
messages. There is no verification of an address. The sender will not know if the message
reaches its destination at the time it is required.

30. An IT enabled organization that involves the radical re-conceptualization of the


business needs ___ for possible threat invasion
Select correct option:

Impact analysis plan


Business continuity plan
Data backup
Control recommendation
31. Which of the following is the main reason of B2C thriving in technologically
advanced societies?
Select correct option:

Vast scope and acceptability


Reachability
Break down of physical barriers
Low costs

Ref: The real reason that B2C is flourishing in technologically advanced societies is that
it has broken down ‘physical’ barriers to doing business.

32. Which of the following IDS will not be able to detect all types of intrusions due to
limitations of detection rules?
Select correct option:

Network-based
Node-based
Signature-based
Statistical-based
Ref: Signature-based IDSs will not be able to detect all types of intrusions due to the
limitations of detection rules. On the other hand, statistical-based systems may report
many events outside of the defined normal activity but which are normal activities on the
network.

33. Effective Business continuity plans can not be executed without proper
Select correct option:

Control recommendation
Control implementation
Control management
Control monitoring
34. What could be the first step in any corporate risk strategy?
Select correct option:

Risk identification
Control implementation
Characterization
Documentation
35. Which of the following supply chain segment includes the organization’s first tier
suppliers?
Select correct option:

Internal
Downstream
Middle stream
Upstream

Ref: Upstream supply chain segment – includes the organization’s first-tier suppliers
(manufacturers and assemblers). The major activities are purchasing and shipping.

36. People can be contacted at any time, refers to:


Select correct option:
Mobility
Instant access
Remote access
Reachability

Ref: Reachability means that people can be contacted at any time, which most people see
as a convenience of modern life.

37. Which of the following network attacks involves probing for network
information?
Select correct option:
Passive attacks
Active attacks
Masquerading
Spoofing
Explanation: By probing for network information, the intruder obtains network
information as that can be used to target a particular system or set of systems during an
actual attack.

38. Which of the following uses internet and online technologies to create operating
efficiencies and therefore increase value to the customer?
Select correct option:

Internet
E-business
IDS
CRM

Ref: E-business means using the internet and online technologies to create operating
efficiencies, and therefore increase value to the customer. All e-commerce is part of e-
business. Not all e-business is e-commerce.

39. Which of the following works in conjunction with routers and firewalls by
monitoring network usage anomalies?
Select correct option:

SDLC
IDS
ISD
DCS

Ref: An IDS works in conjunction with routers and firewalls by monitoring

network usage anomalies. It protects a company’s information systems resources from


external as well as internal misuse.

40. _________ controls the most vulnerable point between a corporate network and
the internet.
Select correct option:

Firewall
Sensors
Data analyzers
Spoofing

Ref: Firewalls are hardware and software combinations that are built using routers,
servers and variety of software. They should control the most vulnerable point between a
corporate network and the Internet.

41. _________ refers to the ability of a system to handle growing amounts of work in
a graceful manner.
Select correct option:
Scalability
Consistency
Security
Clustering

Ref from wikipedia: scalability is a desirable property of a system, a network, or a


process, which indicates its ability to either handle growing amounts of work in a
graceful manner or to be readily enlarged.

42. Impact needs to be measured to


Select correct option:
Identify threat
Record thread history
Worse scenarios of impact
Define the data criticality

Ref: Impact needs to be measured by defining certain levels. E.g. high medium low as
qualitative categories or quantifying the impact by using probability distribution.
• Mission Impact Analysis
• Assess criticality assessment
• Data criticality
• Data sensitivity

43. __________ is a program which undertakes unauthorized activities but looks


legitimate. Select correct option:

Trojan horse (Not Sure)


Virus
Worms
Spyware

You might also like