n processes, access control implements a
a)Security Policy
b)Access Policy
c)Control Policy
d)Check Policy

1 Answer

Answer :

a)Security Policy

Related questions

Description : Intruders is a most common security threat which referred as? a)Account Access b)Data Access c)Hacker or Cracker d)Computer Access

Last Answer : c)Hacker or Cracker

Description : The domestic standards evolved to deal with the issue of IDPs are a. The Disaster Management Act. 2005 b. Land Acquisition Amendment Bill c. National Rehabilitation and Resettlement Policy, 2007 ( NRRP ) d. All of above

Last Answer : d. All of above

Description : Feminist theorists would see which of the following as developments as progress? [A] The establishment of UN Gender Development Index [B] The Election of Indian Speaker [C] The incorporation of gender mainstreaming into policy discourses [D] All of the above

Last Answer : [D] All of the above

Description : The constitution of India provides basic Human Rightsto its people through the – (a) Preamble (b) Fundamental Rights (c) Directive principles of State Policy (d) All of the above

Last Answer : (d) All of the above

Description : The Indian constitution borrowed the idea of Directive principles of state policy from the a) Irish Constitution b) British Constitution c) US Constitution d) None of the above

Last Answer : a) Irish Constitution

Description : Separation of the Judiciary from the Executive has been provided in which of the following parts of the Indian Constitution? (A) The Preamble (B) The Fundamental Rights (C) The Directive Principles of State Policy (D) The Seventh Schedule

Last Answer : (C) The Directive Principles of State Policy

Description : Which part of the Indian constitution deals with the Directive Principles of State Policy? a. Part-III b. Part-IV c. Part-V d. None of them

Last Answer : b. Part-IV

Description : Which of the following Articles contain Directive Principles of State Policy? (a) 30 to 49 (b) 36 to 51 (c) 42 to 56 (d) 28 to 48

Last Answer : (b) 36 to 51

Description : Planning in India derives its objectives from – (i) Preamble (ii) Fundamental duties (iii) Fundamental rights (iv) Directives principles of state policy

Last Answer : (iv) Directives principles of state policy

Description : Separation of the Judiciary from the Executive has been provided in which of the following parts of the Indian Constitution? (A) The Preamble (B) The Fundamental Rights (C) The Directive Principles of State Policy (D) The Seventh Schedule

Last Answer : (C) The Directive Principles of State Policy

Description : Which factor determines when your IT system will be available for knowledge worker to access? a) Availability b) Accessibility c) Reliabilityd) None of the above

Last Answer : a) Availability

Description : ...............................is a type of online advertising where you only pay when somebody clicks on company ads. a) Pay per click b) Use per visit c) Give per login d) Payment per access

Last Answer : a) Pay per click

Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens

Last Answer : d)It is used to ensure data corruption does not happens

Description : A company wide network,closed to public access,which uses internet type technology is called a)Intranet b) Internet c) Extranet d)none of these

Last Answer : a)Intranet

Description : Which of the following is an example of presentation software? a. Ms-Access b. Spreadsheet c. Power-point d. Word processing

Last Answer : c. Power-point

Description : A combination of software and information designed to provide security and information for payment is called - a. digital wallet b. pop up ad c shopping cart d. encryption

Last Answer : d. encryption

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. Pop up ad c. Shopping cart d. Encryption

Last Answer : a. digital wallet

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryption b. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryptionb. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : The main thrust of ‘Copenhegen Summit’ was: a) Food Security b) Air Pollution c) Rehabilitation d) Climate Change

Last Answer : d) Climate Change

Description : The right to life, liberty and security of person under the ICCPR is contained in a. Article 1 b. Article 2 c. Article 3 d. Article 4

Last Answer : c. On 20 th November 1989

Description : What is the myth of protection? [A] It characterizes men as protective and women as protected [B] It is used to justify and shape material security policies [C] It has been challenged by changing gender role in contemporary warfare [D] All of the above

Last Answer : [D] All of the above

Description : The type of threats on the security of a computer system or network are …………………….. i) Interruption ii)Interception iii) Modification iv) Creation v)Fabrication a) i, ii, iii and iv only b) ii, iii, iv and v only c) i, ii, iii and v only d) All i, ii, iii, iv and v

Last Answer : c) i, ii, iii and v only

Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity

Last Answer : a) Confidentiality

Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity

Last Answer : b) Integrity

Description : Use of Full Body Scanner at Airport is an issue between a. Security and Copyright b. Copyright and Privacy c. Security and Privacy d. None of the above

Last Answer : c. Security and Privacy

Description : The reading of the script to check the errors is called: a) Composing b) Proof-reading c) Editing d) None of these

Last Answer : b) Proof-reading

Description : The reading of the script to check the errors is called: A. Composing B. Proof-reading C. Editing D. None of these

Last Answer : B. Proof-reading

Description : The reading of the script to check the errors is called: A. Composing B. Editing C. Proof-reading D. None of these

Last Answer : C. Proof-reading

Description : n which stage or phase of Product Life Cycle, Sales Volume is at Peak Point a) Growth b) Saturation c) Maturity d) Decline

Last Answer : b) Saturation

Description : When preparing a website, designers should ensure that the site makes effective use of the text, pictures and video. This design feature is known as _________. a. communication b.connection c . c o n t e n t d . c o n t e x t

Last Answer : c . c o n t e n t

Description : Who is the Chairman of the State Planning Board? (a) Manik Sarkar (b) Biplab Deb (c) Manik Dey (d) N.C. Debbarma

Last Answer : (a) Manik Sarkar

Description : Making backups, keeping passwords and having access control are used for ………….. (a) Data security -Technology

Last Answer : (a) Backups, access authorised are the techniques to secure data from damage and getting lost.

Description : Access - control based on a person's fingerprints is an example of _____: a) Biometric Identification b) Characteristic Identification c) Characteristic Security d) Fingerprint Security e) Logitstics

Last Answer : a) Biometric Identification

Description : What are some of the benefits of using a firewall for your LAN? 1) Increased access to Instant Messaging 2) Stricter access control to critical resources 3) Greater security to your LAN 4) Both 2 and 3

Last Answer : 4) Both 2 and 3

Description : What is true about FIDM? A. FIDM describes the technologies and protocols B. It uses Security Markup Language (SAML) to package a user's security credentials C. SAML has access control D. All of the above

Last Answer : All of the above

Description : What are some of the benefits of using a firewall for your LAN? 1 Increased access to Instant Messaging 2 Stricter access control to critical resources 3 Greater security to your LAN 4 Both 2 and 3

Last Answer : 4 Both 2 and 3

Description : One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data items. This is referred to as A) Data Security B) Domain access C) Data Control

Last Answer : C) Data Control

Description : Why are wands the magical implements of choice?

Last Answer : checking wikipedia now….

Description : What's a cool name for a computer program that simulates a toy train that implements a computer?

Last Answer : What about BitTrain? No, too dorky.

Description : There is a barrel with no lid and some wine in it. 'This barrel of wine is more than half full,' said the Madam. 'No it's not,' says the man. 'It's less than half full.' ... any measuring implements and without removing any wine from the barrel, how can they easily determine who is correct? -Riddles

Last Answer : Tilt the barrel until the wine barely touches the lip of the barrel. If the bottom of the barrel is visible then it is less than half full. If the barrel bottom is still completely coverd by the wine, then it is more than half full.

Description : There is a barrel with no lid and some wine in it. 'This barrel of wine is more than half full,' said Curly. 'No it's not,' says Mo. 'It's less than half full.' Without any measuring implements and without removing any wine from the barrel, how can they easily determine who is correct? -Riddles

Last Answer : Tilt the barrel until the wine barely touches the lip of the barrel. If the bottom of the barrel is visible then it is less than half full. If the barrel bottom is still completely covered by the wine, then it is more than half full.

Description : What DoD instruction implements the DoD CUI program?

Last Answer : DoDI 5200.48, Controlled Unclassified Information

Description : The secondary tillage implements are

Last Answer : Ans.Cultivator, Harrows, Hoe, Planker, Roller etc.

Description : The primary tillage implements are

Last Answer : Ans.Deshi plough, MB plough, Ridge plough, Disk plough etc.

Description : Indus Valley Civilisation There was a sharp class division at Harappa and Mohenjo-Daro. This is clear from the _____. A. Indus seals excavated B. Religious beliefs of the Harappans C. Tools and implements used by the Harappans D. Different types of dwellings excavated

Last Answer : ANSWER: D

Description : With which period do we associate the ‘microlith’ implements?

Last Answer : Mesolithic

Description : Which search implements stack operation for searching the states? a) Depth-limited search b) Depth-first search c) Breadth-first search d) None of the mentioned

Last Answer : b) Depth-first search

Description : An _____ is a contract between a class and the outside world. When a class implements an interface, it promises to provide the behavior published by that ______: a) Object b) Interface c) Package d) None of These

Last Answer : b) Interface

Description : With which period do we associate the 'microlith' implements?

Last Answer : Uranium