Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryption b. Decryption c. firewall d. all the above
Last Answer : d. all the above
Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above
Description : Which of the following is not related to security mechanism a. encryption b. decryption c. e‐cash d. all the above
Last Answer : c. e‐cash
Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above
Last Answer : b. Cryptography
Description : Encoding or scrambling data for transmission across a network is khown as a)Protection b) Detection c) Encryption d) Decryption
Last Answer : c) Encryption
Description : Smart card is better protected than other card using a) Encryption b) Firewall c) Hub d) All of the above
Last Answer : a) Encryption
Description : Who protects system from external threat? a) EDI b) ERP c) Firewall d) Script kiddies
Last Answer : c) Firewall
Description : Which will not harm computer resources? a) Virus b) Trojan horse c) Firewall d) None of the above
Description : When the information is reverted back into a useful form it is called: a) Standard encryption b) Plain text encryption c) Decryption d) None of These
Last Answer : c) Decryption
Description : When information is transformed from a useful form of understanding to an opaque form of understanding, this is called: a) Encryption b) Decryption c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : The strategy of applying different price vleves for different customers or situation is known as ______. a) Dynamic pricing b) Online bidding c) Direct marketing d) Agent e-business model
Last Answer : a) Dynamic pricing
Description : The________is a blueprint that links the firms e- business strategy with technologty driven marketing strategies. a) E-marketing plan b) Business model c) Situation analysis d) Strategic plan
Last Answer : a) E-marketing plan
Description : ________is the subset of e-commerce focused on transaction. a) E-business b) E-marketing c) Digital technology d) Environment, strategy, performance(ESP)
Last Answer : d) Environment, strategy, performance(ESP)
Description : Considering non personal communication channels, social networking sites, email and company websites are considered as a) Broadcast media b) Display media c) Online media d) Print media
Last Answer : c) Online media
Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above
Last Answer : a. Encryption
Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.
Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.
Description : When a company strives to appeal to multiple well defined market segments with a strategy tailored to each segment, it is applying a. undifferentiated marketing b. differentiated marketing c. concentrated marketing d. the majority fallacy
Last Answer : b. differentiated marketing
Description : The strategy of offering a different product charging a different price and using different promotion and distribution process is called a) Market segmentation b) Market Penetration c) Market Developmentd) None of these
Last Answer : a) Market segmentation
Description : World Bank launched ‘Gender mainstreaming strategy’ in [A] 2000 [B] 2010 [C] 2001 [D] 2002
Last Answer : [C] 2001
Description : Communication is a: A. Strategy B. Theory C. Process D. None of these
Last Answer : C. Process
Description : The establishment of the overall audit strategy involves a. Determining the characteristics of the engagement that defines its scope. b. Ascertaining the reporting objectives of the engagement to plan the timing ... will determine the focus of the engagement team's efforts. d. All of the answers
Last Answer : All of the answers
Description : The establishment of an overall audit strategy involves I. Determining the characteristics of the engagement that define its scope. II. Ascertaining the reporting objectives of the engagement to plan the timing of the audit and the ... II only b. I and III only c. II and III only d. I, II, and III
Last Answer : I, II, and III
Description : Mr. Singh has decided to expand his store hours and offer discounted pricing on his existing line of pet supplies. Which strategy is he considering? A. Market penetration B. Diversification C. Product development D. Promotions
Last Answer : Market penetration
Description : Jenkins is a small retail chain in South Wales. When considering changes in its marketing strategy, the firm's management looks only at changes in shopper attitudes and spending patterns. With ... )passive and proactive B)aggressive and proactive C)dominant and proactive D)passive and reactive
Last Answer : D)passive and reactive
Description : Experienced PC security enthusiasts: What AV/Firewall/Spyware combo have you found to offer the best protection?
Last Answer : I use PCTools Firewall and AntiVirus, as well as ThreatFire and Ad-Aware. So far so good. I’ve been through dozens of FW and AV programs, and I could easily tell you which ones DON’T work. Anything made/sold/offered by Symantec
Description : I found this in the Package Rules menu:
Last Answer : answer:
Description : A firewall is a network security system ______based that controls incoming and outgoing network traffic based on a set of rules: a) Hardware b) Software c) Both hardware or software d) None of These
Last Answer : c) Both hardware or software
Description : __________ is a measure of whether the operation is inside or outside the security boundary or network firewall. a) Per b) P c) Pre d) All of the mentioned
Last Answer : All of the mentioned
Description : What are some of the benefits of using a firewall for your LAN? 1) Increased access to Instant Messaging 2) Stricter access control to critical resources 3) Greater security to your LAN 4) Both 2 and 3
Last Answer : 4) Both 2 and 3
Description : Which of the following will help you to improve your LAN security? 1) Change your passwords frequently 2) Install a firewall program 3) Use a proxy 4) All of the above
Last Answer : 3) Use a proxy
Description : What are some of the benefits of using a firewall for your LAN? 1 Increased access to Instant Messaging 2 Stricter access control to critical resources 3 Greater security to your LAN 4 Both 2 and 3
Last Answer : 4 Both 2 and 3
Description : Which of the following will help you to improve your LAN security? 1 Change your passwords frequently 2 Install a firewall program 3 Use a proxy 4 All of the above
Last Answer : 3 Use a proxy
Description : Which of the following tool is used for security checks as port scanning and firewall testing? A. Netcat B. Nmap C. Data communication D. Netscan
Last Answer : A. Netcat
Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client
Last Answer : b. Intranet
Description : A hardened firewall host on an Intranet is a. a software which runs in any of the computers in the intranet b. a software which runs on a special reserved computer on the intranet c. a stripped down computer connected to the intranet d. a mainframe connected to the intranet to ensure security
Last Answer : b. a software which runs on a special reserved computer on the intranet
Description : A firewall is a a. wall built to prevent fires from damaging a corporate intranet b. security device deployed at the boundary of a company to prevent unauthorized physical access c. ... it from unauthorized access d. device to prevent all accesses from the internet to the corporate intranet
Last Answer : c. security device deployed at the boundary of a corporate intranet to protect it from unauthorized access
Description : A combination of software and information designed to provide security and information for payment is called - a. digital wallet b. pop up ad c shopping cart d. encryption
Last Answer : d. encryption
Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. Pop up ad c. Shopping cart d. Encryption
Last Answer : a. digital wallet
Description : The main thrust of ‘Copenhegen Summit’ was: a) Food Security b) Air Pollution c) Rehabilitation d) Climate Change
Last Answer : d) Climate Change
Description : The right to life, liberty and security of person under the ICCPR is contained in a. Article 1 b. Article 2 c. Article 3 d. Article 4
Last Answer : c. On 20 th November 1989
Description : What is the myth of protection? [A] It characterizes men as protective and women as protected [B] It is used to justify and shape material security policies [C] It has been challenged by changing gender role in contemporary warfare [D] All of the above
Last Answer : [D] All of the above
Description : n processes, access control implements a a)Security Policy b)Access Policy c)Control Policy d)Check Policy
Last Answer : a)Security Policy
Description : Intruders is a most common security threat which referred as? a)Account Access b)Data Access c)Hacker or Cracker d)Computer Access
Last Answer : c)Hacker or Cracker
Description : The type of threats on the security of a computer system or network are …………………….. i) Interruption ii)Interception iii) Modification iv) Creation v)Fabrication a) i, ii, iii and iv only b) ii, iii, iv and v only c) i, ii, iii and v only d) All i, ii, iii, iv and v
Last Answer : c) i, ii, iii and v only
Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity
Last Answer : a) Confidentiality
Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity
Last Answer : b) Integrity
Description : Use of Full Body Scanner at Airport is an issue between a. Security and Copyright b. Copyright and Privacy c. Security and Privacy d. None of the above
Last Answer : c. Security and Privacy