2. Use of Internet attacks in terrorist activities is termed as a. Internet-attack b. National attack c. Cyberterrorism d.



Similar documents
GENERAL OPERATING PRINCIPLES

Active Directory Service

VMware Horizon FLEX Administration Guide

VMware Horizon FLEX Administration Guide

Student Access to Virtual Desktops from personally owned Windows computers

ORGANIZER QUICK START GUIDE

Architecture and Data Flows Reference Guide

Boğaziçi University Department of Economics Spring 2016 EC 102 PRINCIPLES of MACROECONOMICS Problem Set 5 Answer Key

Data Security 1. 1 What is the function of the Jump instruction? 2 What are the main parts of the virus code? 3 What is the last act of the virus?

the machine and check the components Black Yellow Cyan Magenta

Application Note Configuring Integrated Windows Authentication as a McAfee Firewall Enterprise Authenticator. Firewall Enterprise

How To Organize A Meeting On Gotomeeting

Enterprise Digital Signage Create a New Sign

Lesson 1: Getting started

the machine and check the components Starter Ink Cartridges Basic User s Guide Product Safety Guide Telephone Line Cord

JCM TRAINING OVERVIEW Multi-Download Module 2

OxCORT v4 Quick Guide Revision Class Reports

How To Set Up A Network For Your Business

OUTLINE SYSTEM-ON-CHIP DESIGN. GETTING STARTED WITH VHDL August 31, 2015 GAJSKI S Y-CHART (1983) TOP-DOWN DESIGN (1)

Guidance Document: Selecting a Commercial Records Storage Provider

Please read the Product Safety Guide first before you set up your machine. Then, read this Quick Setup Guide for the correct setup and installation.

S-Scrum: a Secure Methodology for Agile Development of Web Services

Start Here. Quick Setup Guide. the machine and check the components. NOTE Not all models are available in all countries.

Start Here. Quick Setup Guide. the machine and check the components DCP-9020CDW

the machine and check the components

McAfee Network Security Platform

the machine and check the components Starter Ink Cartridges Basic User s Guide Product Safety Guide Telephone Line Cord

Revised products from the Medicare Learning Network (MLN) ICD-10-CM/PCS Myths and Facts, Fact Sheet, ICN , downloadable.

KEY SKILLS INFORMATION TECHNOLOGY Level 3. Question Paper. 29 January 9 February 2001

Small Business Networking

Small Business Networking

How To Network A Smll Business

Corrigendum-II Dated:

Before you can use the machine, please read this Quick Setup Guide for the correct setup and installation.

The art of Paperarchitecture (PA). MANUAL

Small Business Networking

Small Business Networking

MATH PLACEMENT REVIEW GUIDE

National Firefighter Ability Tests And the National Firefighter Questionnaire

Before you can use the machine, read this Quick Setup Guide for the correct setup and installation.

- DAY 1 - Website Design and Project Planning

TAX RETURN FILING INSTRUCTIONS

GUIDELINES. under THE PRIVATE HOSPITALS AND MEDICAL CLINICS ACT (1980) AND REGULATIONS (1991) MINISTRY OF HEALTH SINGAPORE

E-Commerce Comparison

SECURITY ISSUES IN THE OPTIMIZED LINK STATE ROUTING PROTOCOL VERSION 2 (OLSRV2)

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment

ACCOUNTING IN THE CLOUD

Unit 5 Section 1. Mortgage Payment Methods & Products (20%)

Enterprise Risk Management Software Buyer s Guide

Return of Organization Exempt From Income Tax

A System Context-Aware Approach for Battery Lifetime Prediction in Smart Phones

DiaGen: A Generator for Diagram Editors Based on a Hypergraph Model

Issues in Information Systems Volume 14, Issue 2, pp , 2013 TOOLS AND TIPS FOR TEACHING SMARTPHONE SECURITY

Small Business Cloud Services

Unit 12: Installing, Configuring and Administering Microsoft Server

ELECTROVALUE: a LCA Approach

On Equivalence Between Network Topologies

Words Symbols Diagram. abcde. a + b + c + d + e

Euler Hermes Services Ireland Ltd. Terms & Conditions of Business for your Debt Collection Services

StyleView SV32 Change Power System Batteries

Unleashing the Power of Cloud

5 a LAN 6 a gateway 7 a modem

Chapter. Contents: A Constructing decimal numbers

The 8 Essential Layers of Small-Business IT Security

FortiClient (Mac OS X) Release Notes VERSION

The Principle of No Punishment Without a Law for It LEARNING OBJECTIVES: CRLA.GAAN:

File Storage Guidelines Intended Usage

Nonbanks and Risk in Retail Payments

Nonbanks and Risk in Retail Payments

50 MATHCOUNTS LECTURES (10) RATIOS, RATES, AND PROPORTIONS

Health Savings Account Application

Would your business survive a crisis? A guide to business continuity planning.

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control

THE ROYAL CORNWALL HOSPITALS NHS TRUST RESPONSE TO INFORMATION REQUEST. Date Request Received: 24 November 2014 FOI Ref: 605

Quick Guide to Lisp Implementation

Move, Inc Citi EMT Conference January 5, 2010


Transcription:

Moule2.txt 1. Choose the right ourse of tion one you feel your mil ount is ompromise?. Delete the ount b. Logout n never open gin. Do nothing, sine no importnt messge is there. Chnge psswor immeitely n lso hnge the reentils of ll ount tht oul hve got ompromise beuse of this 2. Use of Internet ttks in terrorist tivities is terme s. Internet-ttk b. Ntionl ttk. Cyberterrorism. none of the bove 3. Choose the fmous Winows Trojn horse whih is Ientity theft. Zeus b. Bliss. Morris. Alie 4. An pplition use to log user's key stroke. Spywre b. Keyloggers. Rootkits. Mobile mlwre b 5. The ountry whih proues the mximum mount of emil spms. US b. Ini. Chin. Brzil 6. Kismet is. Antivirus softwre b. Anti spywre softwre. wireless network hking tool. none of the bove Pge 1

Moule2.txt 7. Choose goo prties in seurely hnling emils? hoose multiple. View emils s text b. Automtilly open tthments. Delete hin emils n junk emil. Provie the ount number n psswor of your ounts only through emils iretly, 8. Pik out the Clou storge servie. Dropbox b. I-Clou. One-Drive. All of the ABOVE D 9. The proess of more thn one lient shring lou servie. Multitenny b. privte lou. Hybri lou. None of the Above 10. Choose ll essentil hrteristis of goo lou servie. CHOOSE ALL APPROPRIATE ANSWERS. Bro network ess b. Rpi elstiity. On-emn self servie. Py-per-Use billing Moel,b, 11. IS is efine s. The pbility provie to the onsumer is to provision proessing, storge, networks, n other funmentl omputing resoures. b. The pbility provie to the onsumer is to eploy onto the lou infrstruture onsumer rete or quire pplitions rete using progrmming lnguges n tools supporte by the provier.. The pbility provie to the onsumer is to use the provier's pplitions running on lou infrstruture. All of the Above 12. Whih oul be rte s the biggest problem in opting lou servie Pge 2

. Seurity b. Integrtion. Customiztion. Cost Moule2.txt 13. In Is Clou Moel the Server woul be in Client' Control? or Flse Flse 14. Pik out The wrong Sttement?. In PS servie moel the Client hs full liberty n ontrols on the pps running b. In SS servie moel the Client me uses the servies provie on the lou.. Both n b. None of the Above 15. An inseure Network n help ttker lunh DoS ttk on lou system, espeilly in publi network? or Flse true 16. Choose ll esirble properties of evie essing the lou. Strong uthentition mehnisms b. Strong isoltion between pplitions. Cryptogrphi funtionlity when trffi onfientility is require. All of the Above 17. EDoS Stns for. Eletril Denil of Servie b. Extreme Denil of Servie. Eonomi Denil of Sustinbility. None of the Above 18. Whih of these seurity prmeter shoul be resse for Dt-in-Trnsist for Clou. Confientility Pge 3

b. Integrity. Avilbility. All of The ABOVE Moule2.txt,b 19. Whih of these seurity prmeter shoul be resse t Dt-t-rest in Clou. Confientility b. Integrity. Avilbility. All of These 20. or Flse: Google's Privy poliy llows it to ollet informtion bout users' lotion 21. true or Flse: Dt Reminise will beome seurity issue if Destrution is not hnle properly 22. Choose ll objetives of IT Governne. Alignment of IT with the enterprise n reliztion of the promise benefits b. Use of IT to enble the enterprise by exploiting opportunities n mximizing benefits. Responsible use of IT resoures. Approprite mngement of IT-relte risks ll 23. The Penl Setion tht els with breh of onfientility n privy. 66 b. 77. 72. 67 Pge 4

Moule2.txt 24. The Penl Setion tht els with the punishment of publishing or trnsmitting obsene mteril in eletroni form.. 66 b. 77. 72. 67 25. From The Options given below selet ll fetures tht point to phishing e-mil?. If mil is sking for reply with some personl informtion b. Link whih reirets to https seure pge for psswor reset. questions sking you to verify or upte your ount else ts will result in ount suspension.. Both & 26. Whih of the following is worm?. W32/Sober-Z b. W32/Netsky-P. W32/Zfi-B. W32/Mytob-FO 27. Wht oes W32/Sober-Z o to your System. Delete ll ounts b. Enrypt the Hr Disk. Downlos oe from Internet. Removes hr Drive prtitions 28. W32/Netsky ffets whih operting system. Winows b. Linux. Anroi. M Pge 5

Moule2.txt 29. From the Choies pik out ll moules tht oul be inlue in Seurity Bunle softwre pkge. Anti-virus b. firewll. Operting System. Anti-spywre,b, 30. Content filtering/pruentil Control softwre is often inlue in seurity bunle pkge s it oul prevent novie users expose by ttkers. true or Flse 31. Pik out the seurity Suite tht is offere by Symnte?. Internet Seurity Suite b. etrust EZ Armor. PC-illin Internet Seurity. Norton Internet Seurity 32. Pik out ll WRONG sttements bout Personl Firewll?. Its instlle t en users' PC b. Permits or enies ommunitions bse on seurity poliy the user sets. Firewll n help prevent users from opening phishing sites. Firewlls n etet spywres running in users' system 33. Freewres re ll Open Soure Softwres, Whih re sol to en users free of hrge. or flse Flse. Freewres re not essentilly open soure 34. SS Servie moel n only be use in Privte Clou? or Flse Flse. No Suh restrition 35. Shoul the file storge struture of lou be shre with ll lients in Multitenny moel? Yes or No No. A mliious user in one ompny n expose t of other 36. Zero Knowlege Proof woul help to inrese the trust of lients in lou Pge 6

storge. Moule2.txt Yes 37. The issue with Avilbility in lou IS. Fer of loss of t b. Unknown if omputtion went orretly in lou. Denil of Servie ttk. Proper Sling on emn, 38. In the sle of t-expose whih of the following oul be the mximum intensity phishing in Multitenny Clou. An employee in lient phishe b. A lient A's ll employee phishe. Clou Aministrtor. The lrgest lient in terms of employees phishe 39. Ientifying the Assets n potentil ttkers re importnt for generting thret Moel 40. Choose ll flse sttements bout n ttker trying to hk lou network. He n etermine where in the lou infrstruture n instne is lote b. He nnot etermine if two instnes re o-resient on the sme physil mhine. Aversry lunhing instnes lou be o-resient with other user instnes. None of the Above b Pge 7