Today Set 4 question producing here ,Just Practice and gain All the Best ..
1. What type of attack do some firewalls try to limit by enforcing rules on how long a GET or POST request can be?
[A] Smurf
[B] Denial of service
[C] Buffer overflow
[D] LAND
[E] None of these
(Ans):-C
2. This is a documents that states in writing how a company plans to protect the company’s physical and IT assets:
[A] Data Encryption Standard
[B] Security Policy
[C] Public Key Certificate
[D] Access Control List
[E] Copyright
(Ans):-B
3. This is the process of determining whether someone or something os, in fact, who or what is declared to be?
[A] Conditional access
[B] Anonymizer
[C] Bypass
[D] User profile
[E] Authentication
(Ans):-E
4. This is an agreement a company may ask an employee to sign that specifies what is considered to be appropriate (or in appropriate) use of e-mail or web browsing?
[A] RSA
[B] AUP
[C] SET
[D] VPN
[E] None of these
(Ans):-B
5. Which are examples of IPS (Intrusion Protection system)?
[A] Solar Open Design Wall
[B] Grsecurity
[C] LOMAC
[D] All of the above
[E] None of these
(Ans):-D
6. Which of the following are methods of Network Security?
[A] VPN
[B] Encryption
[C] Honey pots
[D] Firewall
[E] All of the above
(Ans):-E
7. This is a set of related programs, usually located at a network gateway server, that protects the resources of a private network from other network:
[A] Firewall
[B] Root kit
[C] Sandbox
[D] Password Cracker
[E] None of these
(Ans):-A
8. What happens if you digitally sign and inject footer on an e-mail message in the order?
[A] Nothing
[B] The message won’t be sent.
[C] The footer will invalidate the signature.
[D] The footer will be illegible.
[E] None of these
(Ans):-C
9. This is a class of programs that searches your hard drive and floppy disks for any known or potential virus:
[A] Intrusion Detection
[B] Security identifier
[C] Antigen
[D] Probe
[E] Antivirus software
(Ans):-E
10. The basic objective of Audit is:
[A] Safeguard and Assets
[B] Maintain Data Integrity
[C] Maintain Process Integrity
[D] Achieve the goals organization effectively
[E] None of these
(Ans):-E
11. Which is not true about Computer audit?
[A] Computer audit does not focus on process integrity.
[B] It throws much light on system effectiveness.
[C] Scope is limited to system and procedure being followed.
[D] Computer audit is carried done mostly around the computer.
[E] None of these
(Ans):-B
12. Which of them is not an input control type?
[A] Unintentional entry of wrong data
[B] Preparation of false input forms
[C] Intentional entry of fraudulent data
[D] Use of unauthorized Input forms
[E] Password secrecy
(Ans):-E
13. What best defines audit Trail?
[A] Trailing of audit process
[B] Chronological record of all events on system are maintained
[C] Chronological record of all events on system are not maintained
[D] Its maintenance of audit process
[E] None of these
(Ans):-B
14. Which of them forms a data items for audit trails?
[A] Unique identifier of source code
[B] Unique identifier of person
[C] Time and Date at which messages are dispatched
[D] Unique identifier for each node of network
[E] All the above
(Ans):-E
15. Which of them is not an approach for computer auditing?
[A] Audit around the computer
[B] Audit with computer
[C] Audit through the computer
[D] Audit on computer
[E] None of these
(Ans):-D
Feel Good Drop a Comment
5 comments:
sir,plz provide online mock test papers of it officer of 200 quetions ...really m will be very thankul to u
Thanx for sharing the Paper Set 4.
I have read All 3 sets It's all are great and you are doing a great job.
One again thanx for sharing.
great
Thanx for guiding.
sir please provide me the discriptive Question and answers for SBI PO-2013 exam...
mail id is bhavanadevagiri@gmail.com
Sir u r doing a g8 Job...........
Sir Pls provide me previous full test papers of IBPS Specialist IT mail id is ashishsewatkar@gmail.com
Thanks in advance....
Post a Comment