.............. requires that data should be made available to only authorized users. A) Data integrity
B) Privacy
C) Security
D) None of the above

1 Answer

Answer :

C) Security

Related questions

Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity

Last Answer : A) Confidentiality

Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity

Last Answer : B) Integrity

Description : he primary goal of the ………………….. protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data items. This is referred to as A) Data Security B) Domain access C) Data Control

Last Answer : C) Data Control

Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity

Last Answer : a) Confidentiality

Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity

Last Answer : b) Integrity

Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity

Last Answer : ii) Integrity

Description : The criteria to be used for a particular engagement can either be established or specifically developed. Established criteria are those a. Designed for the purpose of the engagement. b. Embodied in laws or ... c. Made available to the intended users. d. Not made available to the intended users.

Last Answer : Embodied in laws or regulations or issued by authorized or recognized bodies of experts that follow a transparent due process

Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : In IT, means that the data available in the database is both accurate and consistent. (1) Data Security (2) Data Availability (3) Data Binding (4) Data Integrity

Last Answer : Data Integrity

Description : Apple doesn't want to unlock the terrorist's iPhone for the FBI. Is the privacy of iphone users more important than national security?

Last Answer : What is most bothersome to me is that the FBI cannot do this on their own. I mean supposedly we possess some the most advanced technology and hackers in the world. So why don't they just do this ... way Apple has a court order to help and it will be interesting to see how long Apple stands firm.

Description : Which if the following is not the type of data integrity. A) Key integrity B) Domain integrity C) Entity integrity D) Referential integrity

Last Answer : A) Key integrity

Description : ………………… is preferred method for enforcing data integrity A) Constraints B) Stored Procedure C) Triggers D) Cursors

Last Answer : A) Constraints

Description : ……………. is a preferred method for enforcing data integrity A) Constraints B) Stored procedure C) Triggers D) Cursors

Last Answer : A) Constraints

Description : Data Integrity control uses ................ (A) Upper and lower limits on numeric data. (B) Passwords to prohibit unauthorised access to files. (C) Data dictionary to keep the data (D) Data dictionary to find last access of data

Last Answer : (B) Passwords to prohibit unauthorised access to files.

Description : An ER Model includes I. An ER diagram portraying entity types. II. Attributes for each entity type III. Relationships among entity types. IV. Semantic integrity constraints that reflects the business rules about data not ... ; IV (B) I&IV (C) I, II & IV (D) I & III

Last Answer : (A) I, II, III & IV

Description : Database applications were built directly on top of file system to overcome the following drawbacks of using file-systems (a) Data redundancy and inconsistency (b) Difficulty in accessing Data (c) Data isolation (d) Integrity problems (A) (a) (B) ... d) (C) (a), (b) and (c) (D) (a), (b), (c) and (d)

Last Answer : (D) (a), (b), (c) and (d) 

Description : Which of the following is/are the functions of operating system? i) Sharing hardware among users. ii) Allowing users to share data among themselves. iii) Recovering from errors. iv) Preventing users from interfering with one another. ... only C) i, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above

Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files

Description : . ………………… is a special type of integrity constraint that relates two relations & maintains consistency across the relations. A) Entity Integrity Constraints B) Referential Integrity Constraints

Last Answer : B) Referential Integrity

Description : Centralizing the integrity checking directly under the DBMS ………….. Duplication and ensures the consistency and validity of the database. A) Increases B) Skips C) Does not reduce D) Reduces

Last Answer : D) Reduces

Description : The ……………. is used to provide integrity check, authentication and encryption to IP datagram. A) SSL B) ESP C) TSL D) PSL

Last Answer : B) ESP

Description : The student marks should not be greater than 100. This is (A) Integrity constraint (B) Referential constraint (C) Over-defined constraint (D) Feasible constraint

Last Answer : (A) Integrity constraint

Description : In RDBMS, the constraint that no key attribute (column) may be NULL is referred to as: (A) Referential integrity (B) Multi-valued dependency (C) Entity Integrity (D) Functional dependency

Last Answer : (C) Entity Integrity

Description : If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be: (A) N (B) (N-1) (C) N(N-1)/2 (D) N(N+1)/2

Last Answer : (C) N(N-1)/2 

Description : The performance of data communications network depends on .............. A) Number of users B) The hardware and software C) The transmission D) All of the above

Last Answer : D) All of the above

Description : It is better to use files than a DBMS when there are (A) Stringent real-time requirements. (B) Multiple users wish to access the data. (C) Complex relationships among data. (D) All of the above.

Last Answer : (B) Multiple users wish to access the data.

Description : In distributed databases, location transparency allows for database users, programmers and administrators to treat the data as if it is at one location. A SQL query with location transparency needs to specify: (A) Inheritances (B) Fragments (C) Locations (D) Local formats 

Last Answer : (B) Fragments

Description : Which security provision is used to ensure data integrity and authentication? -Technology

Last Answer : A digital signature helps the user to ensure data integrity and authentication.

Description : Security methods such as private encryption, VLANs and firewalls comes under __________ subject area. a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned

Last Answer : Data Privacy

Description : Which of the following statements about Google App Engine (GAE) is INCORRECT. A. It's a Platform as a Service (PaaS) model. B. Automatic Scalability is built in with GAE. As ... s applications. So, applications can take advantage of reliability, performance and security of Google's infrastructure.

Last Answer : You can decide on how many physical servers required for hosting your application.

Description : A company is considering a cloud environment to improve the operating efficiency for their dataand applications. The company is part of an industry where strict security and data privacy issues are of the highest ... a good choice? A. hybrid cloud B. public cloud C. private cloud D. governed cloud

Last Answer : private cloud

Description : Suppose a digitized voice channel is made by digitizing 8 kHz bandwidth analog voice signal. It is required to sample the signal at twice the highest frequency (two samples per hertz). What is the bit rate required, if it ... sample requires 8 bits? (A) 32 kbps (B) 64 kbps (C) 128 kbps (D) 256 kbps

Last Answer : (C) 128 kbps

Description : In which of the following circumstances would a CPA be bound by ethics to refrain from disclosing any confidential information obtained during the course of a professional engagement? a. The CPA is ... the PICPA. d. An inquiry by a disciplinary body of PICPA requests confidential client information

Last Answer : A major stockholder of a client company seeks accounting information from the CPA after management declined to disclose the requested information

Description : Consider the following statements: (a) Revised simplex method requires lesser computations than the simplex method. (b) Revised simplex method automatically generates the inverse of the current basis matrix. (c) Less number of entries are needed ... c) only (C) (b) and (c) only (D) (a), (b) and (c)

Last Answer : (D) (a), (b) and (c)

Description : In C++, polymorphism requires: (A) Inheritance only (B) Virtual functions only (C) References only (D) Inheritance, Virtual functions and references

Last Answer : (D) Inheritance, Virtual functions and references 

Description : Which of the following are facts about a top-down software testing approach? I. Top-down testing typically requires the tester to build method stubs. II. Top-down testing typically requires the tester to build test drivers. (1) only I (2) Only II (3) Both I and II (4) Neither I nor II

Last Answer : (1) only I

Description : Which of the following are the functions of operating system? i) recovering from errors ii) facilitating input/output iii) facilitating parallel operation iv) sharing hardware among users v) implementing user interface A) i, ii, ... only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : Some of the criteria for calculation of priority of a process are: a. Processor utilization by an individual process. b. Weight assigned to a user or group of users. c. Processor utilization by a user or group of processes. In fair share ... (a) and (c) (3) (a), (b) and (c) (4) only (b) and (c)

Last Answer : (3) (a), (b) and (c)

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : The security furnished by an official will be liable to forfeiture by a) Director General b) Head of the circle c) Any officer authorized by DG Post d) Both the A & C

Last Answer : d) Both the A & C