my cs507 quiz3 by soban
TRANSCRIPT
-
8/6/2019 My Cs507 Quiz3 by Soban
1/4
To get the More entertain and
Study related e-mail
Kindly visit and Join the group.
VU And COMPANY.(http://groups.google.com.pk/group/vu-and-company?hl=en)
Muhammad Soban
0333-7637637
Question # 1 of 10 ( Start time: 12:43:01 PM ) Total Marks: 1
__________ are installed at the point where network connections enter a site.
Select correct option:
Antivirus Bridges Routers Firewalls
Question # 2 of 10 ( Start time: 12:43:59 PM ) Total Marks: 1
Which of the following are normally skilled programmers, and have been known to crack
system passwords, with quite an ease?
Select correct option:
Hackers Crackers Hacktivists Intruders
http://groups.google.com.pk/group/vu-and-company?hl=enhttp://groups.google.com.pk/group/vu-and-company?hl=enhttp://groups.google.com.pk/group/vu-and-company?hl=en -
8/6/2019 My Cs507 Quiz3 by Soban
2/4
Question # 3 of 10 ( Start time: 12:45:01 PM ) Total Marks: 1
Documentation may include program code of application softwares, technical manuals, user
manuals e
Select correct option:
True False
Question # 4 of 10 ( Start time: 12:45:47 PM ) Total Marks: 1
Audit Trial is a weakness that can be accidentally triggered or intentionally exploited.
Select correct option:
Trues False
Question # 5 of 10 ( Start time: 12:46:28 PM ) Total Marks: 1
Which of the following is the secret character string that is required to log onto a computer
system?
Select correct option:
ID PIN PASSWORD none of these
Question # 6 of 10 ( Start time: 12:47:06 PM ) Total Marks: 1
A personal identification number (PIN) is a secret shared between a user and a system that
can be used to authenticate the user to the system.
Select correct option:
True False
-
8/6/2019 My Cs507 Quiz3 by Soban
3/4
Question # 7 of 10 ( Start time: 12:47:51 PM ) Total Marks: 1
An audit trail may record "before" and "after" images, also called Snapshots of records.
Select correct option:
True False
Question # 8 of 10 ( Start time: 12:48:28 PM ) Total Marks: 1
Traversing of a record of every keystroke, often called
Select correct option:
Physical Key Monitoring Logical Key Monitoring Keystroke Monitoring Primary Key Monitoring
Question # 9 of 10 ( Start time: 12:49:23 PM ) Total Marks: 1
Boot virus protection means ________________ based virus protection.
Select correct option:
Hardware Software Liveware Firmware
Question # 10 of 10 ( Start time: 12:50:12 PM ) Total Marks: 1
Which of the following network attacks involves probing for network information?
Select correct option:
Passive attacks Active attacks Masquerading Spoofing
-
8/6/2019 My Cs507 Quiz3 by Soban
4/4
To get the More entertain and
Study related e-mail
Kindly visit and Join the group.
VU And COMPANY.(http://groups.google.com.pk/group/vu-and-company?hl=en)
Muhammad Soban
0333-7637637
http://groups.google.com.pk/group/vu-and-company?hl=enhttp://groups.google.com.pk/group/vu-and-company?hl=enhttp://groups.google.com.pk/group/vu-and-company?hl=en