Description : Who protects system from external threat? a) EDI b) ERP c) Firewall d) Script kiddies
Last Answer : c) Firewall
Description : The solution for all business needs is a. EDI b. ERP c. SCM d. None of the above
Last Answer : b. ERP
Description : Who breaks into other people's computer systems and steals and destroys information? a. Hackers b. softwares c. Hacktivists d. Script kiddies
Last Answer : a. Hackers
Description : What is hardware and/or software that protects computers from intruders? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : c. Firewall
Description : Which is not a feature of ecommerce a. SCM b. EDI c. WWW d. BPR
Last Answer : d. BPR
Description : What is another name for? a. Direct materials b. Indirect materials c. EDI d. None of the above
Last Answer : b. Indirect materials
Description : What are ballpoint pens purchased by a clothing company? a. Direct materials b. Indirect materials c. EDI d. None of the above
Description : What are materials that are necessary for running a modern corporation, but do not relate to the company's primary business activities? a. Direct materials b. Indirect materials c. EDI d. None of the above
Description : What are materials used in production in a manufacturing company or are placed on the shelf for sale in a retail environment? a. Direct materials b. Indirect materials c. EDI d. None of the above
Last Answer : a. Direct materials
Description : Which is not a function of ERP? a. Human resource management b. financial c. warehousing d. None of the above
Last Answer : d. None of the above
Description : Which is not a component of ERP? a. Legacy systems b. Bolt on applications c. Operational database d. Cybersoft
Last Answer : d. Cybersoft
Description : ERP stands for a. Enterprise resolution planning b. Enterprise reverse planning c. Enterprise resource planning d. None of the above
Last Answer : c. Enterprise resource planning
Description : Which is a function of ERP? a. Warehousing b. sales c. scheduling d. all of the above
Last Answer : d. all of the above
Description : Which is not a function of ERP? a. Warehousing b. sales c. scheduling d. None of the above
Description : Which one is not a server level threat? a. Malicious code b. CGI threats c. Database threats d. Buffer overflows
Last Answer : a. Malicious code
Description : Which one is a communication channel threat? a. Sniffer programs b. Cyber vandalism c. Integrity threats d. All of the above
Last Answer : d. All of the above
Description : What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets? a. Risk management b. Risk assessment c. Security d. None of the above
Last Answer : b. Risk assessment
Description : What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness? a. Risk management b. Risk assessment c. Security d. None of the above
Last Answer : a. Risk management
Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above
Last Answer : b. Cryptography
Description : Which one is a threat for E‐commerce a. Trojan horse b. firewall c. encryption d. None
Last Answer : a. Trojan horse
Description : Smart card is better protected than other cards using a. Encryption b. Firewall c. Hub d. All the above
Last Answer : a. Encryption
Description : Which of the following is a characteristic of a firewall? a. Examines each message as it seeks entrance to the network b. Blocks messages without the correct markings from entering the network c. Detects computers communicating with the Internet without approval d. All of the above
Description : What is the use of physical characteristics — such as your fingerprint, the blood vessels in the retina of your eye, the sound of your voice, or perhaps even your breath — to provide identification? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : d. Biometrics
Description : What software detects and removes or quarantines computer viruses? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : b. Anti‐virus
Description : What is the process of making a copy of the information stored on a computer? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : a. Backup
Description : Which will not harm computer resources a. firewall b. Virus c. Trojan horse d. None of the above
Last Answer : a. firewall
Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client
Last Answer : b. Intranet
Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above
Last Answer : d. all the above
Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : c. Script virus
Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : a. Macro
Description : A non-skilled person who gains access to computer system using already made tools are known as? a. Grey hat hackers b. Hacktivist c. Script kiddies d. Phreakers
Last Answer : c. Script kiddies
Description : The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________ a) Sponsored Hackers b) Hactivists c) Script Kiddies d) Whistle Blowers
Last Answer : d) Whistle Blowers
Description : Which type of hacker represents the highest risk to your network? A. Disgruntled employees B. Black-hat hackers C. Grey-hat hackers D. Script kiddies
Last Answer : A. Disgruntled employees
Description : Who are use their skill to identify security problem with computer network A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies
Last Answer : B)Ethical Hacker
Description : 0 White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies
Last Answer : B)Ethical
Description : Banner grabbing is often used for……. a. White hat hacking b. Black hat hacking c. Gray hat hacking d. Script kiddies
Last Answer : a. White hat hacking
Last Answer : D. Script kiddies
Description : ) which type of hackers represent the highest risk to your network (a) black hat hackers (b) grey hat hackers (c) disgruntled employees (d) script kiddies
Last Answer : (c) disgruntled employees
Description : banner grabbing is often use for (a) white hat hacking (b) black hat hacking (c) gray hat hacking (d) script kiddies
Last Answer : (a) white hat hacking
Description : Banner grabbing is used for A. White Hat Hacking B. Black Hat Hacking C. Grey Hat Hacking D. Script Kiddies
Last Answer : A. White Hat Hacking
Last Answer : c) Script Kiddies
Description : Which type of hacker represents the highest risk to your network? ∙ A. Disgruntled employees ∙ B. Black-hat hackers ∙ C. Grey-hat hackers ∙ D. Script kiddies
Description : White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies
Description : Which one is the component of cybercash payment system a. CC user software b. CC merachant software c. CC Server Software d. All of the above
Description : Which of the following is not a reason why digital cash has turned out to be extremely difficult? a. If your system crashes you lose your money b. There is only one standard c. Digital ... makes money laundering easy d. Digital cash travels across the vast Internet and is susceptible to begin stolen
Last Answer : b. There is only one standard
Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software
Last Answer : b. Public key encryption
Description : What sends work assignments through an e‐mail system? a. Database‐based enterprise information portal b. Messaging‐based enterprise information portal c. Database‐based workflow system d. Messaging‐based workflow system
Last Answer : d. Messaging‐based workflow system
Description : What defines all of the steps or business rules, from beginning to end, required for a process to run correctly? a. Workflow b. EIP c. Workflow system d. SLA
Last Answer : a. Workflow