- Medium Sized organizations are normally a family ownership run by
4 Father
& Sons
4 Brothers
4 Father-Son
and Brothers
4 None
of the given
REFRENCE
3.1.2 Medium Sized
Organizations
Medium Sized organizations are normally a family
ownership run by brothers,
father-son
- Small organizations usually have complex management structure.
4 True
4False
3.1.1 Small Organizations
Small organizations usually have simple management structure
Which
of the following functions provide such data as sales prospect and contact
information,
product information, product configurations and sales quotes?
4 Sales force automation (SFA)
4 CRM
4 ERP
4 MIS
Sales force automation (SFA)
It automates some of the company's
critical sales and sales force management functions, for example,
• Customer account management,
• Forecasting sales,
• Sales administration,
• Keeping track of customer preferences,
• Sales staff performance.
SFA empowers the sales force to
close deals at the customer’s office and to configure marketing strategies
at home. SFA is providing tools
for very highly evolved sales organizations, organizations that are basically
marketing machines..
Closed
system is dependent on the internal resources and data.
4 True
4 False
Closed system – entry to the library is restricted to the students only.
Which
of the following works in conjunction with routers and firewalls by
monitoring network usage anomalies to
protect a company’s information
systems
resources from external as well as internal misuse?
4 Encryption
4 Intrusion
Detection Systems
4 Firewall
4 All
of above
An IDS works in conjunction with routers and firewalls
by monitoring
network usage anomalies. It protects a company’s
information systems resources from external as
well as internal misuse
Attack
is one of the types of Web Security Threats
4 True
4 False
39.1 Web Security Threats
There is two major classes of security threats
• Passive Attacks
• Active Attacks
39.2 Passive attacks
This class of network attacks involves probing for
network information. These passive attacks can
lead to actual active attacks or
intrusions/penetrations into an organization’s network. By probing
for network information, the intruder obtains network
information as that can be used to target a
particular system or set of systems during an actual
attack.
Types of Passive attacks
Examples of passive attacks that gather network
information include the following:
• Network Analysis
• Eavesdropping
• Traffic Analysis
39.3 Active Attacks
Once enough network information has been gathered, the
intruder will launch an actual attack
against a targeted system to either gain complete
control over that system or enough control to
cause certain threats to be realized. This may include
obtaining unauthorized access to modify data
or programs, causing a denial of service, escalating
privileges, accessing other systems. They affect
the integrity, availability and authentication
attributes of network security
If
an organization can tolerate some downtime, cold sites backup might be
appropriate.
4 True
4 False
Cold sites
If an organization can tolerate some downtime, cold sites backup might be
appropriate
Which
of the following includes assessment of controls already been implemented
or
planned, probability that they can be broken, assessment of potential loss
despite
such
controls existing?
4 Control
Analysis
4 Vulnerability
Assessment
4 Risk
Management
4 All
of above
Control Analysis
This phase includes assessment of controls already
been implemented or planned, probability that
they can be broken, assessment of potential loss
despite such controls existing
Audit
Trials can be used together with controls trials to identify and provide
information
about users suspected of improper modification of data.
4 True
4 False
Trails
Establishing clear audit trails is an absolute must as much as managing
physical environmental risks. They
help in identifying the start and execution of transaction from the
cradle to the grave. Audit logs to be kept
should also record the errors occurring and possible actions should be
taken to mitigate risks. Maintaining
audit logs also helps in drilling down for investigation purposes.
Exception report can also be prepared
from these audit logs
No comments:
Post a Comment