Translate

Tuesday 5 March 2013

CS507 SOLVED QUIZ WITH REFRENCE


  • Medium Sized organizations are normally a family ownership run by

4 Father & Sons
4 Brothers
4 Father-Son and Brothers
4 None of the given
REFRENCE
3.1.2 Medium Sized Organizations
Medium Sized organizations are normally a family ownership run by brothers, father-son


  • Small organizations usually have complex management structure.

4 True
4False
3.1.1 Small Organizations
Small organizations usually have simple management structure
Which of the following functions provide such data as sales prospect and contact
information, product information, product configurations and sales quotes?
4 Sales force automation (SFA)
4 CRM
4 ERP
4 MIS
Sales force automation (SFA)
It automates some of the company's critical sales and sales force management functions, for example,
Customer account management,
Forecasting sales,
Sales administration,
Keeping track of customer preferences,
Sales staff performance.
SFA empowers the sales force to close deals at the customer’s office and to configure marketing strategies
at home. SFA is providing tools for very highly evolved sales organizations, organizations that are basically
marketing machines..
Closed system is dependent on the internal resources and data.
4 True
4 False
Closed system – entry to the library is restricted to the students only.
Which of the following works in conjunction with routers and firewalls by
monitoring network usage anomalies to protect a company’s information
systems resources from external as well as internal misuse?
4 Encryption
4 Intrusion Detection Systems
4 Firewall
4 All of above
An IDS works in conjunction with routers and firewalls by monitoring
network usage anomalies. It protects a company’s information systems resources from external as
well as internal misuse
Attack is one of the types of Web Security Threats
4 True
4 False
39.1 Web Security Threats
There is two major classes of security threats
Passive Attacks
Active Attacks
39.2 Passive attacks
This class of network attacks involves probing for network information. These passive attacks can
lead to actual active attacks or intrusions/penetrations into an organization’s network. By probing
for network information, the intruder obtains network information as that can be used to target a
particular system or set of systems during an actual attack.
Types of Passive attacks
Examples of passive attacks that gather network information include the following:
Network Analysis
Eavesdropping
Traffic Analysis
39.3 Active Attacks
Once enough network information has been gathered, the intruder will launch an actual attack
against a targeted system to either gain complete control over that system or enough control to
cause certain threats to be realized. This may include obtaining unauthorized access to modify data
or programs, causing a denial of service, escalating privileges, accessing other systems. They affect
the integrity, availability and authentication attributes of network security

If an organization can tolerate some downtime, cold sites backup might be
appropriate.
4 True
4 False
Cold sites
If an organization can tolerate some downtime, cold sites backup might be appropriate

Which of the following includes assessment of controls already been implemented
or planned, probability that they can be broken, assessment of potential loss despite
such controls existing?
4 Control Analysis
4 Vulnerability Assessment
4 Risk Management
4 All of above
Control Analysis
This phase includes assessment of controls already been implemented or planned, probability that
they can be broken, assessment of potential loss despite such controls existing

Audit Trials can be used together with controls trials to identify and provide
information about users suspected of improper modification of data.
4 True
4 False
Trails
Establishing clear audit trails is an absolute must as much as managing physical environmental risks. They
help in identifying the start and execution of transaction from the cradle to the grave. Audit logs to be kept
should also record the errors occurring and possible actions should be taken to mitigate risks. Maintaining
audit logs also helps in drilling down for investigation purposes. Exception report can also be prepared
from these audit logs

No comments:

Post a Comment