Description : Who protects system from external threats? a. firewall b. EDI c. ERP d. Script kiddies
Last Answer : a. firewall
Description : The solution for all business needs is a. EDI b. ERP c. SCM d. None of the above
Last Answer : b. ERP
Description : A non-skilled person who gains access to computer system using already made tools are known as? a. Grey hat hackers b. Hacktivist c. Script kiddies d. Phreakers
Last Answer : c. Script kiddies
Description : The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________ a) Sponsored Hackers b) Hactivists c) Script Kiddies d) Whistle Blowers
Last Answer : d) Whistle Blowers
Description : Which type of hacker represents the highest risk to your network? A. Disgruntled employees B. Black-hat hackers C. Grey-hat hackers D. Script kiddies
Last Answer : A. Disgruntled employees
Description : Who are use their skill to identify security problem with computer network A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies
Last Answer : B)Ethical Hacker
Description : 0 White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies
Last Answer : B)Ethical
Description : Banner grabbing is often used for……. a. White hat hacking b. Black hat hacking c. Gray hat hacking d. Script kiddies
Last Answer : a. White hat hacking
Last Answer : D. Script kiddies
Description : ) which type of hackers represent the highest risk to your network (a) black hat hackers (b) grey hat hackers (c) disgruntled employees (d) script kiddies
Last Answer : (c) disgruntled employees
Description : banner grabbing is often use for (a) white hat hacking (b) black hat hacking (c) gray hat hacking (d) script kiddies
Last Answer : (a) white hat hacking
Description : Banner grabbing is used for A. White Hat Hacking B. Black Hat Hacking C. Grey Hat Hacking D. Script Kiddies
Last Answer : A. White Hat Hacking
Last Answer : c) Script Kiddies
Description : Which type of hacker represents the highest risk to your network? ∙ A. Disgruntled employees ∙ B. Black-hat hackers ∙ C. Grey-hat hackers ∙ D. Script kiddies
Description : White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies
Description : Who breaks into other people's computer systems and steals and destroys information? a. Hackers b. softwares c. Hacktivists d. Script kiddies
Last Answer : a. Hackers
Description : Which is not a feature of e-commerce? a) SCM b) EDI c) WWW d) BPR
Last Answer : d) BPR
Description : EDI stands for: a. Electronic Data Information b. Electronic Data Interchange c Exchange Data Interchange d. Electronic Device Information
Last Answer : a. Electronic Data Information
Description : What are materials used in production in a manufacturing company or are placed on the shelf for sale in a retail environment? a. Direct materials b. Indirect materials c.EDI d. None of the above
Last Answer : a. Direct materials
Description : The two main types of Internet based B2B commerce are...... A. Net marketplaces and private industrial networks B. EDI and collaborative commerceC. Net marketplaces and collaborative commerce D. EDI and private industrial networks
Last Answer : D. EDI and private industrial networks
Description : ERP stands for a) Enterprise resolution planning b) Enterprise reveres planning c) Enterprise resource planning d) None of the above
Last Answer : c) Enterprise resource planning
Description : Which is a function of ERP? a. Warehousing b. Sales c Scheduling d. all of the above
Last Answer : b. Sales
Description : What is hardware and/or software that protects computers from intruders? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : c. Firewall
Description : Smart card is better protected than other card using a) Encryption b) Firewall c) Hub d) All of the above
Last Answer : a) Encryption
Description : Which will not harm computer resources? a) Virus b) Trojan horse c) Firewall d) None of the above
Last Answer : c) Firewall
Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryption b. Decryption c. firewall d. all the above
Last Answer : d. all the above
Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryptionb. Decryption c. firewall d. all the above
Description : Which one is a threat for E‐commerce a. Trojan horse b. firewall c. encryption d. None
Last Answer : a. Trojan horse
Description : The reading of the script to check the errors is called: a) Composing b) Proof-reading c) Editing d) None of these
Last Answer : b) Proof-reading
Description : The press release is a term used often in _______ (a) Magazine (b) Documentary (c) Script Writing (d) Newspapers
Last Answer : (c) Script Writing
Description : The reading of the script to check the errors is called: A. Composing B. Proof-reading C. Editing D. None of these
Last Answer : B. Proof-reading
Description : The reading of the script to check the errors is called: A. Composing B. Editing C. Proof-reading D. None of these
Last Answer : C. Proof-reading
Description : Which one is a communication channel threat? a) Sniffer programs b) Cyber vandalism c) Integrity threats d) All of the above
Last Answer : d) All of the above
Description : If it is easy for competitions to enter the market, the threat of new entrants is considered: a) High b) Low c) More d) Less
Last Answer : a) High
Description : If the threat of substitute products or services in low it is a/an ; a) Disadvantages of the supplier b) Advantages of the buyer c) Advantages of the supplier d) None of the above
Last Answer : c) Advantages of the supplier
Description : Intruders is a most common security threat which referred as? a)Account Access b)Data Access c)Hacker or Cracker d)Computer Access
Last Answer : c)Hacker or Cracker
Description : Which protects the embryo from external injury
Last Answer : Which protects the embryo from external injury A. Amnion B. Allantois C. Chorion D. Yolk sac.
Description : Woollen cloth protects the body from cold because – (1) it is a good conductor of heat (2) it is a poor conductor of heat (3) external heat rays enter into the body through the woollen cloth (4) it reflects heat
Last Answer : (2) it is a poor conductor of heat Explanation: It is just because woolen clothes have fibres and between those fibres air is trapped which reduces heat loss. It reduces heat loss because it is an insulator or poor conductor of heat.
Description : Woollen cloth protects the body from cold because (1) it is a good conductor of heat (2) it is a poor conductor of heat (3) external heat rays enter into the body through the woollen cloth (4) it reflects heat
Last Answer : it is a poor conductor of heat
Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point
Last Answer : A) Chock point
Description : Which type of emergency has not been declared so far in India? (1) Internal emergency caused due to internal disturbances (2) External emergency caused due to external threat (3) State emergency, caused due to failure of constitutional machinery in the stales (4) Financial emergency
Last Answer : (4) Financial emergency Explanation: If the President is satisfied that there is an economic situation in which the financial stability or credit of India is threatened, he or she can declare ... had arisen but was avoided by putting the gold assets of India as collateral for foreign credit.
Description : Banner grabbing is often used for a) White hat hacking b) Black hat hacking c) Gray hat hacking d) Scepit Kiddies
Last Answer : a) White hat hacking
Description : The product of the radiated RF power of a transmitter and the gain of the antenna system in a given direction relative to an isotropic radiator is called ____. A. Effective Radiated Power (ERP) B. Effective Isotropic Radiated Power (EIRP) C. Radiated Power D. Transmit Power
Last Answer : B. Effective Isotropic Radiated Power (EIRP)
Description : The _________ should plan well and execute perfectly the implementation of ERP. A. Organisation B. System developers C. Vendors D. Top Management
Last Answer : B. System developers
Description : What is at the heart of any ERP system? A. Information B. Employees C. Customers D. Database
Last Answer : D. Database
Description : Which of the following describes an ERP system? A. ERP systems provide a foundation for collaboration between departments B. ERP systems enable people in different business areas to communicate C. ERP ... used to make the decisions that drive the organisation's performance D. All of the above
Last Answer : D. All of the above