A computer checks the _____ of user names and passwords for 9 a match before granting access. 1) Website 2) Network 3) Backup file 4) Data base 5) None of these

1 Answer

Answer :

Answer :4

Related questions

Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above

Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files

Description : Do you use the same user names and passwords for all of your websites, accounts, etc...?

Last Answer : NO! I user differnent passwords. It’s particularly risky to use the same password in more than one place as your user name for most websites is your email address and some idiot website owners keep user names and passwords in plain text data bases

Description : Coded entries which are used to gain access to a computer system are called: a) Passwords b) Coded Instructions c) Conceal Feed Entry d) None of These

Last Answer : a) Passwords

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : 1) large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1 large numbers of users direct access to the computer for problem solving 2 large number of user for file sharing 3 both of above 4 none

Last Answer : 1 large numbers of users direct access to the computer for problem solving

Description : To contact people using the internet, you most often use their: a) domain names b) e-mail addresses c) usernames d) passwords e) None of these

Last Answer : b) e-mail addresses

Description : Which one of the following is correct, when a class grants friend status to another class? (A) The member functions of the class generating friendship can access the members of the friend class. (B) ... the friendship. (C) Class friendship is reciprocal to each other (D) There is no such concept.

Last Answer : All member functions of the class granted friendship have unrestricted access to the members of the class granting the friendship. 

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : Making backups, keeping passwords and having access control are used for ………….. (a) Data security -Technology

Last Answer : (a) Backups, access authorised are the techniques to secure data from damage and getting lost.

Description : Data Integrity control uses ................ (A) Upper and lower limits on numeric data. (B) Passwords to prohibit unauthorised access to files. (C) Data dictionary to keep the data (D) Data dictionary to find last access of data

Last Answer : (B) Passwords to prohibit unauthorised access to files.

Description : In Unix operating system, special files are used to : (A) buffer data received in its input from where a process reads (B) provide a mechanism to map physical device to file names (C ... pointers associated with i-nodes (D) store information entered by a user application program or utility program

Last Answer : (B) provide a mechanism to map physical device to file names 

Description : ……… is not covered under file management. (a) Secure files (b) Easy access to files (c) Schedule processes (d) Keep backup of files -Technology

Last Answer : (c) Because schedule processes comes under processor management.

Description : What is backup? 1) Adding more components to your network 2) Protecting data by copying it from the original source to a different destination 3) Filtering old data from the new data 4) Accessing data on tape 5) None of these

Last Answer : Answer :2

Description : Which device is used to backup the data? A) Floppy Disk B) Tape C) Network Drive D) All of the above

Last Answer : Answer : D

Description : If I'm going to return my computer to the store for a replacement or refund, what do I need to do to clear out any passwords or history from being visible to workers who may have access to the computer?

Last Answer : What browser are you using? If Firefox, you can press Ctrl+Shift+Del or click Tools->Clear Recent History. Other browsers probably have similar options.

Description : The ability to find an individual item in a file immediately _____ is used. 1) File allocation table 2) Directory 3) Sequential access 4) Direct access 4 5) None of these

Last Answer : Answer :1

Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications

Last Answer : b. It does three way handshake before sending datagrams

Description : The ability to find an individual item in a file immediately _____ is used: a) file allocation table b) directory c) sequential access d) direct access e) None of The Above

Last Answer : a) file allocation table

Description : ................is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation

Last Answer : A) Encryption

Description : Is it illegal for an ex-wife to access my facebook messages or email messages if she finds my passwords?

Last Answer : Yes. Change everything. If she manages to do it again, get proof and take her to court.

Description : To read a file in HDFS, a user sends an _______ request to the NameNode toget the location of file blocks. a) access b) open c) authentication d) create

Last Answer : open

Description : In a star network each node (file server, workstations and peripherals) is connected to a central device called a _____: a) Bug b) Center c) Hub d) None of These

Last Answer : c) Hub

Description : How can you increase the capacity of an Oracle tablespace? Note: there are 2 correct answers in this question A. Resize the existing data file B. Add a new data file to ... compression of backup data using Oracle advanced compression D. Increase the value of the database parameter DB_BLOCK_SIZE

Last Answer : B. Add a new data file to the existing tablespace

Description : The user generally applies _________ to access mainframe or super computer? (A) node (B) terminal (C) desktop (D) None of the Above

Last Answer : (B) terminal

Description : Which of the following is used to protect objects in computer system, in the absence of more complete protection schemes? (1) digital certificate (2) digital signature (3) passwords (4) tokens

Last Answer : passwords

Description : Which layers of the OSI determines the interface often system with the user? A) Network B) Application C) Data link D) Session

Last Answer : B) Application

Description : It helps a user to have remote access to an application from a server. a) Application virtualization b) Network virtualization c) Desktop virtualization d) Storage virtualization

Last Answer : Application virtualization

Description : A transaction file is a type of: a) Master File b) Data File c) Access Method d) None of The Above

Last Answer : b) Data File

Description : The Method of file organisation in which data records in a file are arranged in a specified order according to a key field is known as the1 Direct access method 2) Queuing method 3) Predetermined method 4) Sequential method

Last Answer : 4) Sequential method

Description : Which of the following layer protocols are responsible for user and theapplicationprogrammesupport such aspasswords, resource sharing, file transfer and network management? A. Layer 7 protocols B. Layer 6 protocols C. Layer 5 protocols D. Layer 4 protocols E. None of the above

Last Answer : Layer 7 protocols

Description : Point out the wrong statement. a) XML checks the ID request against its policies and either allows or denies the request b) SPML in most instances operates as a reply/request mechanism c) User centric authentication takes place usually in the form of knowledge cards d) All of the mentioned

Last Answer : SPML in most instances operates as a reply/request mechanism

Description : What does an authorization profile in an AS ABAP based SAP system contains? A. collection of authorizations B. The user menu C. Profile parameters, such as the password ... (login/password_expiration_time) D. The collection of the authorizations checks that a user has passed successfully

Last Answer : A. collection of authorizations

Description : The issues that deal with the collection and use of data about individual is _____: a) Access b) Publicity c) Accuracy d) Property e) Privacy

Last Answer : e) Privacy

Description : 16. Fourth generation mobile technology provides enhanced capabilities allowing the transfer of both _____ data, including full-motion video, high-speed internet access, and video conferencing. a) video data and ... voice and non-voice c) music and video d) video and audio e) None of these

Last Answer : b) voice and non-voice

Description : The purpose of backup is: a) To restore a computer to an operational state following a disaster b) To restore small numbers of files after they have been accidentally deleted c) To restore one among many version of the same file for multiple backup environment d) All of the mentioned

Last Answer : All of the mentioned

Description : 1. The purpose of backup is: a) To restore a computer to an operational state following a disaster b) To restore small numbers of files after they have been accidentally deleted c) To restore one among many version of the same file for multiple backup environment d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following statements about the Crime and Criminal Tracking Network System (CCTNS) is/are correct? 1. It will facilitate real time access of classified criminal data to the law enforcement authorities. 2. National Crime ... below- 1) 1 only 2) 2 only 3) Both 1 and 2 4) Neither 1 nor 2

Last Answer : 1) 1 only

Description : The Network is overloaded with enormous data sent by many computers within the network. The inability of the network to deliver the data is termed as __________ . (1) Access control (2) Congestion (3) Error propagation (4) Deadlock

Last Answer : Congestion

Description : What checks out your computer or network for potential weaknesses? a. Encryption b. Public key encryption c. Security‐auditing software d. None of the above

Last Answer : c. Security‐auditing software

Description : Which of the following tool is used for security checks as port scanning and firewall testing? A. Netcat B. Nmap C. Data communication D. Netscan

Last Answer : A. Netcat

Description : SFC is prohibited from granting financial assistance to any company whose aggregate paid up capital exceed__________. A. 1 crore. B. 1.5 crores. C. 2 crores. D. 2.5 crores.

Last Answer : A. 1 crore.

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : ______ is the art of exploiting the human elements to gain access to the authorized user. A. Social Engineering. B. IT Engineering. C. Ethical Hacking. D. None of the above.

Last Answer : A. Social Engineering.

Description : Should there be intensive background checks for surrogate mothers or for women prior to allowing them access to artificial insemination?

Last Answer : No – it’s her God-given right to procreate. Being a surrogate for another family is different, and all the reputable companies do extensive background checks on their surrogates even though it isn’t always required by law.

Description : The absence of which of the following internal controls increases the opportunity for fraud? a. Appropriate segregation of duties or independent checks b. Job applicant screening for employees with access to ... access to assets d. The absence of any of the above increases the opportunity for fraud

Last Answer : The absence of any of the above increases the opportunity for fraud

Description : In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to _____that protect encryption keys: a) Hand over passwords b) Decrypt Files c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which among the following is wrong characteristic of "Phishing": a) Fakers, by offering special rewards or money prize etc asked for personal information such as passwords, credit card information, social ... purpose is theft or misuse the acquired material c) Both of Above d) None of These

Last Answer : d) None of These

Description : Which among the following is wrong characteristic of "Phishing": a) Fakers, by offering special rewards or money prize etc asked for personal information such as passwords, credit card information, social ... purpose is theft or misuse the acquired material c) Both of Above d) None of These

Last Answer : d) None of These