Who protects system from external threat?
a) EDI
b) ERP
c) Firewall
d) Script kiddies

1 Answer

Answer :

c) Firewall

Related questions

Description : Who protects system from external threats? a. firewall b. EDI c. ERP d. Script kiddies

Last Answer : a. firewall

Description : The solution for all business needs is a. EDI b. ERP c. SCM d. None of the above

Last Answer : b. ERP

Description : A non-skilled person who gains access to computer system using already made tools are known as? a. Grey hat hackers b. Hacktivist c. Script kiddies d. Phreakers

Last Answer : c. Script kiddies

Description : The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________ a) Sponsored Hackers b) Hactivists c) Script Kiddies d) Whistle Blowers

Last Answer : d) Whistle Blowers

Description : Which type of hacker represents the highest risk to your network? A. Disgruntled employees B. Black-hat hackers C. Grey-hat hackers D. Script kiddies

Last Answer : A. Disgruntled employees

Description : Who are use their skill to identify security problem with computer network A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies

Last Answer : B)Ethical Hacker

Description : 0 White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies

Last Answer : B)Ethical

Description : Banner grabbing is often used for……. a. White hat hacking b. Black hat hacking c. Gray hat hacking d. Script kiddies

Last Answer : a. White hat hacking

Description : Which type of hacker represents the highest risk to your network? A. Disgruntled employees B. Black-hat hackers C. Grey-hat hackers D. Script kiddies

Last Answer : D. Script kiddies

Description : ) which type of hackers represent the highest risk to your network (a) black hat hackers (b) grey hat hackers (c) disgruntled employees (d) script kiddies

Last Answer : (c) disgruntled employees

Description : banner grabbing is often use for (a) white hat hacking (b) black hat hacking (c) gray hat hacking (d) script kiddies

Last Answer : (a) white hat hacking

Description : Banner grabbing is used for A. White Hat Hacking B. Black Hat Hacking C. Grey Hat Hacking D. Script Kiddies

Last Answer : A. White Hat Hacking

Description : Which type of hacker represents the highest risk to your network? A. Disgruntled employees B. Black-hat hackers C. Grey-hat hackers D. Script kiddies

Last Answer : A. Disgruntled employees

Description : The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________ a) Sponsored Hackers b) Hactivists c) Script Kiddies d) Whistle Blowers

Last Answer : c) Script Kiddies

Description : Which type of hacker represents the highest risk to your network? ∙ A. Disgruntled employees ∙ B. Black-hat hackers ∙ C. Grey-hat hackers ∙ D. Script kiddies

Last Answer : A. Disgruntled employees

Description : Who are use their skill to identify security problem with computer network A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies

Last Answer : B)Ethical Hacker

Description : White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies

Last Answer : B)Ethical

Description : Who breaks into other people's computer systems and steals and destroys information? a. Hackers b. softwares c. Hacktivists d. Script kiddies

Last Answer : a. Hackers

Description : Which is not a feature of e-commerce? a) SCM b) EDI c) WWW d) BPR

Last Answer : d) BPR

Description : EDI stands for: a. Electronic Data Information b. Electronic Data Interchange c Exchange Data Interchange d. Electronic Device Information

Last Answer : a. Electronic Data Information

Description : What are materials used in production in a manufacturing company or are placed on the shelf for sale in a retail environment? a. Direct materials b. Indirect materials c.EDI d. None of the above

Last Answer : a. Direct materials

Description : The two main types of Internet based B2B commerce are...... A. Net marketplaces and private industrial networks B. EDI and collaborative commerceC. Net marketplaces and collaborative commerce D. EDI and private industrial networks

Last Answer : D. EDI and private industrial networks

Description : ERP stands for a) Enterprise resolution planning b) Enterprise reveres planning c) Enterprise resource planning d) None of the above

Last Answer : c) Enterprise resource planning

Description : Which is a function of ERP? a. Warehousing b. Sales c Scheduling d. all of the above

Last Answer : b. Sales

Description : What is hardware and/or software that protects computers from intruders? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : c. Firewall

Description : Smart card is better protected than other card using a) Encryption b) Firewall c) Hub d) All of the above

Last Answer : a) Encryption

Description : Which will not harm computer resources? a) Virus b) Trojan horse c) Firewall d) None of the above

Last Answer : c) Firewall

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryption b. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryptionb. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : Which one is a threat for E‐commerce a. Trojan horse b. firewall c. encryption d. None

Last Answer : a. Trojan horse

Description : The reading of the script to check the errors is called: a) Composing b) Proof-reading c) Editing d) None of these

Last Answer : b) Proof-reading

Description : The press release is a term used often in _______ (a) Magazine (b) Documentary (c) Script Writing (d) Newspapers

Last Answer : (c) Script Writing

Description : The reading of the script to check the errors is called: A. Composing B. Proof-reading C. Editing D. None of these

Last Answer : B. Proof-reading

Description : The reading of the script to check the errors is called: A. Composing B. Editing C. Proof-reading D. None of these

Last Answer : C. Proof-reading

Description : Which one is a communication channel threat? a) Sniffer programs b) Cyber vandalism c) Integrity threats d) All of the above

Last Answer : d) All of the above

Description : If it is easy for competitions to enter the market, the threat of new entrants is considered: a) High b) Low c) More d) Less

Last Answer : a) High

Description : If the threat of substitute products or services in low it is a/an ; a) Disadvantages of the supplier b) Advantages of the buyer c) Advantages of the supplier d) None of the above

Last Answer : c) Advantages of the supplier

Description : Intruders is a most common security threat which referred as? a)Account Access b)Data Access c)Hacker or Cracker d)Computer Access

Last Answer : c)Hacker or Cracker

Description : Which protects the embryo from external injury

Last Answer : Which protects the embryo from external injury A. Amnion B. Allantois C. Chorion D. Yolk sac.

Description : Woollen cloth protects the body from cold because – (1) it is a good conductor of heat (2) it is a poor conductor of heat (3) external heat rays enter into the body through the woollen cloth (4) it reflects heat

Last Answer : (2) it is a poor conductor of heat Explanation: It is just because woolen clothes have fibres and between those fibres air is trapped which reduces heat loss. It reduces heat loss because it is an insulator or poor conductor of heat.

Description : Woollen cloth protects the body from cold because – (1) it is a good conductor of heat (2) it is a poor conductor of heat (3) external heat rays enter into the body through the woollen cloth (4) it reflects heat

Last Answer : (2) it is a poor conductor of heat Explanation: It is just because woolen clothes have fibres and between those fibres air is trapped which reduces heat loss. It reduces heat loss because it is an insulator or poor conductor of heat.

Description : Woollen cloth protects the body from cold because (1) it is a good conductor of heat (2) it is a poor conductor of heat (3) external heat rays enter into the body through the woollen cloth (4) it reflects heat

Last Answer :  it is a poor conductor of heat

Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point

Last Answer : A) Chock point

Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point

Last Answer : A) Chock point

Description : Which type of emergency has not been declared so far in India? (1) Internal emergency caused due to internal disturbances (2) External emergency caused due to external threat (3) State emergency, caused due to failure of constitutional machinery in the stales (4) Financial emergency

Last Answer : (4) Financial emergency Explanation: If the President is satisfied that there is an economic situation in which the financial stability or credit of India is threatened, he or she can declare ... had arisen but was avoided by putting the gold assets of India as collateral for foreign credit.

Description : Banner grabbing is often used for a) White hat hacking b) Black hat hacking c) Gray hat hacking d) Scepit Kiddies

Last Answer : a) White hat hacking

Description : The product of the radiated RF power of a transmitter and the gain of the antenna system in a given direction relative to an isotropic radiator is called ____. A. Effective Radiated Power (ERP) B. Effective Isotropic Radiated Power (EIRP) C. Radiated Power D. Transmit Power

Last Answer : B. Effective Isotropic Radiated Power (EIRP)

Description : The _________ should plan well and execute perfectly the implementation of ERP. A. Organisation B. System developers C. Vendors D. Top Management

Last Answer : B. System developers

Description : What is at the heart of any ERP system? A. Information B. Employees C. Customers D. Database

Last Answer : D. Database

Description : Which of the following describes an ERP system? A. ERP systems provide a foundation for collaboration between departments B. ERP systems enable people in different business areas to communicate C. ERP ... used to make the decisions that drive the organisation's performance D. All of the above

Last Answer : D. All of the above