You are on page 1of 5

1.

What type of attack do some firewalls try to limit by enforcing rules on how long a GET or
POST request can be?
[A] Smurf
[B] Denial of service
[C] Buffer overflow
[D] LAND
[E] None of these
(Ans):-C

2. This is a documents that states in writing how a company plans to protect the companys
physical and IT assets:
[A] Data Encryption Standard
[B] Security Policy
[C] Public Key Certificate
[D] Access Control List
[E] Copyright
(Ans):-B

3. This is the process of determining whether someone or something os, in fact, who or what
is declared to be?
[A] Conditional access
[B] Anonymizer
[C] Bypass
[D] User profile
[E] Authentication
(Ans):-E

4. This is an agreement a company may ask an employee to sign that specifies what is
considered to be appropriate (or in appropriate) use of e-mail or web browsing?
[A] RSA
[B] AUP
[C] SET
[D] VPN
[E] None of these
(Ans):-B

5. Which are examples of IPS (Intrusion Protection system)?
[A] Solar Open Design Wall
[B] Grsecurity
[C] LOMAC
[D] All of the above
[E] None of these
(Ans):-D

6. Which of the following are methods of Network Security?
[A] VPN
[B] Encryption
[C] Honey pots
[D] Firewall
[E] All of the above
(Ans):-E

7. This is a set of related programs, usually located at a network gateway server, that protects
the resources of a private network from other network:
[A] Firewall
[B] Root kit
[C] Sandbox
[D] Password Cracker
[E] None of these
(Ans):-A

8. What happens if you digitally sign and inject footer on an e-mail message in the order?
[A] Nothing
[B] The message wont be sent.
[C] The footer will invalidate the signature.
[D] The footer will be illegible.
[E] None of these
(Ans):-C

9. This is a class of programs that searches your hard drive and floppy disks for any known or
potential virus:
[A] Intrusion Detection
[B] Security identifier
[C] Antigen
[D] Probe
[E] Antivirus software
(Ans):-E

10. The basic objective of Audit is:
[A] Safeguard and Assets
[B] Maintain Data Integrity
[C] Maintain Process Integrity
[D] Achieve the goals organization effectively
[E] None of these
(Ans):-E

11. Which is not true about Computer audit?
[A] Computer audit does not focus on process integrity.
[B] It throws much light on system effectiveness.
[C] Scope is limited to system and procedure being followed.
[D] Computer audit is carried done mostly around the computer.
[E] None of these
(Ans):-B

12. Which of them is not an input control type?
[A] Unintentional entry of wrong data
[B] Preparation of false input forms
[C] Intentional entry of fraudulent data
[D] Use of unauthorized Input forms
[E] Password secrecy
(Ans):-E

13. What best defines audit Trail?
[A] Trailing of audit process
[B] Chronological record of all events on system are maintained
[C] Chronological record of all events on system are not maintained
[D] Its maintenance of audit process
[E] None of these
(Ans):-B

14. Which of them forms a data items for audit trails?
[A] Unique identifier of source code
[B] Unique identifier of person
[C] Time and Date at which messages are dispatched
[D] Unique identifier for each node of network
[E] All the above
(Ans):-E

15. Which of them is not an approach for computer auditing?
[A] Audit around the computer
[B] Audit with computer
[C] Audit through the computer
[D] Audit on computer
[E] None of these
(Ans):-D

You might also like