Physical security is concerned with protecting computer hardware from
human tampering and natural disasters and _____security is concerned with
protecting software from unauthorized tampering or damage:
a) Data
b) Cyber
c) Internet
d) Meta Physical
e) Publicity

1 Answer

Answer :

b) Cyber

Related questions

Description : By security in e-Commerce we mean (i) Protecting an organization's data resource from unauthorized access (ii)Preventing disasters from happening (iii) Authenticating messages received by an organization (iv) Protecting messages sent on ... a. i, ii b. ii, iii c. iii, iv d. i, iii, iv

Last Answer : It's D

Description : Laws relating to protecting the internet and other online communication technology isa. Cyber Law b. Computer Law c. IT Law d. None of these

Last Answer : b. Computer Law

Description : Which among the following is correct: a) A firewall is a system designed to prevent unauthorized access to or from a private network. b) Firewalls can be implemented in both hardware and software or a combination of both. c) Both of Above d) None of these

Last Answer : c) Both of Above

Description : A firewall is a a. wall built to prevent fires from damaging a corporate intranet b. security device deployed at the boundary of a company to prevent unauthorized physical access c. ... it from unauthorized access d. device to prevent all accesses from the internet to the corporate intranet

Last Answer : c. security device deployed at the boundary of a corporate intranet to protect it from unauthorized access

Description : is a branch of Science which deals with the helping machine find solutions to complex problems in a more human like fashion a. Artificial Intelligence b. Internet Od Things c. Embedded system d. cyber Security

Last Answer : a. Artificial Intelligence

Description : is a branch of science which deals with helping machine find solution to complex to problem in a more human like a fashion. (a) Artificial intelligence (b) Internet of think (c) Embided system (d) Cyber security

Last Answer : (a) Artificial intelligence

Description : Mark the correct option related to submission of robbery report to DG Posts a) Case of highway robbery of mail involving loss of cash/valuables above Rs 50000 b) The attacks on offices by dacoits ... ) Cases of fraud and loss or misappropriation of public money exceeds Rs 50000 e) All the above

Last Answer : e) All the above

Description : ______ is a branch of computer science which deals with helping machines finds solutions to complex problems in a more human like fashions A. Artificial Intelligence B. Internet of Things C. Embedded System D. Cyber Security

Last Answer : A. Artificial Intelligence 

Description : If a Postal or SA finds a registered bundle bearing signs of damage or tampering, he should note the irregularity in the error book/note book and then: (A) Transfer the registered bundle to the ... in the presence of the Postmaster / HSA (D) Open the registered bundle in presence of two witnesses

Last Answer : (A) Transfer the registered bundle to the Postmaster/HAS

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : Is a security software program that protects a computer from access by unauthorized users.?

Last Answer : That's called a firewall.

Description : Is a security software program that protects a computer from access by unauthorized users.?

Last Answer : That's called a firewall.

Description : . _________ are those individuals who maintain and handles IT security in any firm or organization. a) IT Security Engineer b) Cyber Security Interns c) Software Security Specialist d) Security Auditor

Last Answer : a) IT Security Engineer

Description : _________ are those individuals who maintain and handles IT security in any firm or organization. a) IT Security Engineer b) Cyber Security Interns c) Software Security Specialist d) Security Auditor Answer: a

Last Answer : a) IT Security Engineer

Description : Unauthorized copying of software to be used for personal gain instead of for personal backup is called ______: a) program thievery b) data snatching c) software piracy d) program looting e) data looting

Last Answer : c) software piracy

Description : Select the most appropriate definition of Ethical hacking. a. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the viruses ... for security vulnerabilities and plugging the hole before the viruses get chance to handle them.

Last Answer : c. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the unauthorized peoples get a chance to exploit them.

Description : Hazards and Disasters are mainly classified as a. Physical and chemical b. Natural and Human induced c. Physical and Human d. Social and cultural

Last Answer : b. Natural and Human induced

Description : Cyber trails are advantageous because: A. They are not connected to the physical world. B. Nobody can be harmed by crime on the Internet. C. They are easy to follow. D. Offenders who are unaware of them leave behind more clues than they otherwise would have.

Last Answer : D. Offenders who are unaware of them leave behind more clues than they otherwise would have.

Description : Which car company created a big scandal by tampering with the emissions measurement software in their cars? A. BMW B. AUDI C. Ford D. Volkswagen

Last Answer : ANSWER: B

Description : The physical devices of a computer: a) Software b) Package c) Hardware d) System Software

Last Answer : Answer: c Explanation: Hardware refers to the physical devices of a computer system. Software refers to a collection of programs. A program is a sequence of instructions

Description : Physical components that make up your computer are known as ..... 1) Operating Systems 2) Software 3) Hardware 4) Web Browsers

Last Answer : 3) Hardware

Description : Software Engineering is an engineering discipline that is concerned with: (1) how computer systems work. (2) theories and methods that underlie computers and software systems. (3) all ... (4) all aspects of computer-based systems development, including hardware, software and process engineering.

Last Answer : Answer: 3

Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : b. Intranet

Description : Concerned about the impact on her firm's promotional messages, Karen Dickson of Magnum PLC., seeks an approach with immediate feedback. She is most likely to achieve this through. A)television advertising B)newspaper advertising C)publicity D)personal selling E)sales promotion

Last Answer : D)personal selling

Description : Following a hurricane, a tremendous demand for gas-powered generators occurs. Gotts Hardware holds a large stock of these items and it faces major ethical decisions with regard to the ------ issue. A) product B) advertising C) personal selling D) publicity E) pricing

Last Answer : E) pricing

Description : A firewall is a network security system ______based that controls incoming and outgoing network traffic based on a set of rules: a) Hardware b) Software c) Both hardware or software d) None of These

Last Answer : c) Both hardware or software

Description : 4. What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? A. Desktop, laptop, server B. Personal computer, Internet, mobile telephone C. Hardware, software, networks D. Open computer systems, communication systems, and embedded systems

Last Answer : D. Open computer systems, communication systems, and embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : _________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : Role of security auditor is to ____________ a) secure the network b) probe for safety and security of organization’s security components and systems c) detects and prevents cyber attacks and threats to organization d) does penetration testing on different web applications

Last Answer : b) probe for safety and security of organization’s security components and systems

Description : ________ is the unauthorized copying of an organization’s internally developed software or the illegal duplication of commercially available software. A. Software license B. Software Piracy C. Both (A) and (B) D. None of the above.

Last Answer : B. Software Piracy

Description : Software that prevents unauthorized persons from accessing certain parts of a program, database or network is: a) Firewall b) Scanner c) Anti - Virus d) None of These

Last Answer : a) Firewall

Description : Who must initially determine what level of damage would occur to information if unauthorized disclosure of the information occurred?

Last Answer : The Original Classification Authority

Description : Firewalls are frequently used to prevent unauthorized internet users from accessing private networks connected to the internet especially ____: a) Intranets b) Extranets c) Both of Above d) None of These

Last Answer : a) Intranets

Description : _________ is a generic term for organized collection of computer data and instructions. A. firmware B. Software C. hardware D. None of the above

Last Answer : B. Software

Description : Information needed to develop, use or maintain computer hardware and software and to permit access and retrieval of data is known as: a) Software b) Documentation c) Operation of Hardware d) None of These

Last Answer : b) Documentation

Description : __________ security consultants uses database security monitoring & scanning tools to maintain security to different data residing in the database / servers / cloud. a) Database b) Network c) System d) Hardware

Last Answer : d) Hardware

Description : The personnel who deals with the computer and its management put together are called A) Software B) Human ware C) Firmware D) Hardware

Last Answer : Answer : B

Description : Which of the following is correct: a) All pages in internet use HTML b) Browser is piece of software to browse internet. c) Bridge is a piece of hardware which connects two LANs. d) All of Above e) None of These

Last Answer : d) All of Above

Description : Is a social movement dedicated to protecting the natural world from the undesirable changes brought about by human actions.?

Last Answer : In scientific research, the strongest form of evidence comesfrom

Description : Consider the following statements about Internet facility: 1) It serves as the largest one-line information system. 2) It provides the most dependable and latest mode for sending E-mail. 3) Recurring ... communication E-mail is very high. 4) It is often misused and has triggered cyber-crimes.

Last Answer : 1) It serves as the largest one-line information system