Which of the following is a useful security mechanism when considering business
strategy and IT?
a. Encryptionb. Decryption
c. firewall
d. all the above

1 Answer

Answer :

d. all the above

Related questions

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryption b. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above

Last Answer : d. all the above

Description : Which of the following is not related to security mechanism a. encryption b. decryption c. e‐cash d. all the above

Last Answer : c. e‐cash

Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above

Last Answer : b. Cryptography

Description : Encoding or scrambling data for transmission across a network is khown as a)Protection b) Detection c) Encryption d) Decryption

Last Answer : c) Encryption

Description : Smart card is better protected than other card using a) Encryption b) Firewall c) Hub d) All of the above

Last Answer : a) Encryption

Description : Who protects system from external threat? a) EDI b) ERP c) Firewall d) Script kiddies

Last Answer : c) Firewall

Description : Which will not harm computer resources? a) Virus b) Trojan horse c) Firewall d) None of the above

Last Answer : c) Firewall

Description : When the information is reverted back into a useful form it is called: a) Standard encryption b) Plain text encryption c) Decryption d) None of These

Last Answer : c) Decryption

Description : When information is transformed from a useful form of understanding to an opaque form of understanding, this is called: a) Encryption b) Decryption c) Both of Above d) None of These

Last Answer : a) Encryption

Description : When the information is reverted back into a useful form it is called: a) Standard encryption b) Plain text encryption c) Decryption d) None of These

Last Answer : c) Decryption

Description : When information is transformed from a useful form of understanding to an opaque form of understanding, this is called: a) Encryption b) Decryption c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : The strategy of applying different price vleves for different customers or situation is known as ______. a) Dynamic pricing b) Online bidding c) Direct marketing d) Agent e-business model

Last Answer : a) Dynamic pricing

Description : The________is a blueprint that links the firms e- business strategy with technologty driven marketing strategies. a) E-marketing plan b) Business model c) Situation analysis d) Strategic plan

Last Answer : a) E-marketing plan

Description : ________is the subset of e-commerce focused on transaction. a) E-business b) E-marketing c) Digital technology d) Environment, strategy, performance(ESP)

Last Answer : d) Environment, strategy, performance(ESP)

Description : Considering non personal communication channels, social networking sites, email and company websites are considered as a) Broadcast media b) Display media c) Online media d) Print media

Last Answer : c) Online media

Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above

Last Answer : a. Encryption

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : When a company strives to appeal to multiple well defined market segments with a strategy tailored to each segment, it is applying a. undifferentiated marketing b. differentiated marketing c. concentrated marketing d. the majority fallacy

Last Answer : b. differentiated marketing

Description : The strategy of offering a different product charging a different price and using different promotion and distribution process is called a) Market segmentation b) Market Penetration c) Market Developmentd) None of these

Last Answer : a) Market segmentation

Description : World Bank launched ‘Gender mainstreaming strategy’ in [A] 2000 [B] 2010 [C] 2001 [D] 2002

Last Answer : [C] 2001

Description : Communication is a: A. Strategy B. Theory C. Process D. None of these

Last Answer : C. Process

Description : The establishment of the overall audit strategy involves a. Determining the characteristics of the engagement that defines its scope. b. Ascertaining the reporting objectives of the engagement to plan the timing ... will determine the focus of the engagement team's efforts. d. All of the answers

Last Answer : All of the answers

Description : The establishment of an overall audit strategy involves I. Determining the characteristics of the engagement that define its scope. II. Ascertaining the reporting objectives of the engagement to plan the timing of the audit and the ... II only b. I and III only c. II and III only d. I, II, and III

Last Answer : I, II, and III

Description : Mr. Singh has decided to expand his store hours and offer discounted pricing on his existing line of pet supplies. Which strategy is he considering? A. Market penetration B. Diversification C. Product development D. Promotions

Last Answer : Market penetration

Description : Mr. Singh has decided to expand his store hours and offer discounted pricing on his existing line of pet supplies. Which strategy is he considering? A. Market penetration B. Diversification C. Product development D. Promotions

Last Answer : Market penetration

Description : Jenkins is a small retail chain in South Wales. When considering changes in its marketing strategy, the firm's management looks only at changes in shopper attitudes and spending patterns. With ... )passive and proactive B)aggressive and proactive C)dominant and proactive D)passive and reactive

Last Answer : D)passive and reactive

Description : Experienced PC security enthusiasts: What AV/Firewall/Spyware combo have you found to offer the best protection?

Last Answer : I use PCTools Firewall and AntiVirus, as well as ThreatFire and Ad-Aware. So far so good. I’ve been through dozens of FW and AV programs, and I could easily tell you which ones DON’T work. Anything made/sold/offered by Symantec

Description : I found this in the Package Rules menu:

Last Answer : answer:

Description : A firewall is a network security system ______based that controls incoming and outgoing network traffic based on a set of rules: a) Hardware b) Software c) Both hardware or software d) None of These

Last Answer : c) Both hardware or software

Description : __________ is a measure of whether the operation is inside or outside the security boundary or network firewall. a) Per b) P c) Pre d) All of the mentioned

Last Answer : All of the mentioned

Description : What are some of the benefits of using a firewall for your LAN? 1) Increased access to Instant Messaging 2) Stricter access control to critical resources 3) Greater security to your LAN 4) Both 2 and 3

Last Answer : 4) Both 2 and 3

Description : Which of the following will help you to improve your LAN security? 1) Change your passwords frequently 2) Install a firewall program 3) Use a proxy 4) All of the above

Last Answer : 3) Use a proxy

Description : What are some of the benefits of using a firewall for your LAN? 1 Increased access to Instant Messaging 2 Stricter access control to critical resources 3 Greater security to your LAN 4 Both 2 and 3

Last Answer : 4 Both 2 and 3

Description : Which of the following will help you to improve your LAN security? 1 Change your passwords frequently 2 Install a firewall program 3 Use a proxy 4 All of the above

Last Answer : 3 Use a proxy

Description : Which of the following tool is used for security checks as port scanning and firewall testing? A. Netcat B. Nmap C. Data communication D. Netscan

Last Answer : A. Netcat

Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : b. Intranet

Description : A hardened firewall host on an Intranet is a. a software which runs in any of the computers in the intranet b. a software which runs on a special reserved computer on the intranet c. a stripped down computer connected to the intranet d. a mainframe connected to the intranet to ensure security

Last Answer : b. a software which runs on a special reserved computer on the intranet 

Description : A firewall is a a. wall built to prevent fires from damaging a corporate intranet b. security device deployed at the boundary of a company to prevent unauthorized physical access c. ... it from unauthorized access d. device to prevent all accesses from the internet to the corporate intranet

Last Answer : c. security device deployed at the boundary of a corporate intranet to protect it from unauthorized access

Description : A combination of software and information designed to provide security and information for payment is called - a. digital wallet b. pop up ad c shopping cart d. encryption

Last Answer : d. encryption

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. Pop up ad c. Shopping cart d. Encryption

Last Answer : a. digital wallet

Description : The main thrust of ‘Copenhegen Summit’ was: a) Food Security b) Air Pollution c) Rehabilitation d) Climate Change

Last Answer : d) Climate Change

Description : The right to life, liberty and security of person under the ICCPR is contained in a. Article 1 b. Article 2 c. Article 3 d. Article 4

Last Answer : c. On 20 th November 1989

Description : What is the myth of protection? [A] It characterizes men as protective and women as protected [B] It is used to justify and shape material security policies [C] It has been challenged by changing gender role in contemporary warfare [D] All of the above

Last Answer : [D] All of the above

Description : n processes, access control implements a a)Security Policy b)Access Policy c)Control Policy d)Check Policy

Last Answer : a)Security Policy

Description : Intruders is a most common security threat which referred as? a)Account Access b)Data Access c)Hacker or Cracker d)Computer Access

Last Answer : c)Hacker or Cracker

Description : The type of threats on the security of a computer system or network are …………………….. i) Interruption ii)Interception iii) Modification iv) Creation v)Fabrication a) i, ii, iii and iv only b) ii, iii, iv and v only c) i, ii, iii and v only d) All i, ii, iii, iv and v

Last Answer : c) i, ii, iii and v only

Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity

Last Answer : a) Confidentiality

Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity

Last Answer : b) Integrity

Description : Use of Full Body Scanner at Airport is an issue between a. Security and Copyright b. Copyright and Privacy c. Security and Privacy d. None of the above

Last Answer : c. Security and Privacy