0% found this document useful (0 votes)
192 views1 page

DISA Test Module 1

This document contains a quiz with multiple choice questions related to information technology topics like business continuity planning, operating systems, IT governance, and security controls. The questions test knowledge about network devices, business process reengineering methodologies, data validation techniques, organizational policies, risk assessment, and public key infrastructure encryption.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
192 views1 page

DISA Test Module 1

This document contains a quiz with multiple choice questions related to information technology topics like business continuity planning, operating systems, IT governance, and security controls. The questions test knowledge about network devices, business process reengineering methodologies, data validation techniques, organizational policies, risk assessment, and public key infrastructure encryption.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Sl no Question A B C D Ans

1 The most significant level of effort for the BCP generally required during the Testing stage Evaluation stage Maintenance stage Early stages of planning D
2 Which type of network devices directs packets through the Internet Hubs Routers Repeaters Modems B
Top executives issues a policy Procedures are created to suitable systems for tracking and The clients operating records are
3 Which of the following is the best choice to ensure that Internal control objectives are met
stating compliance objectives govern employee conduct reporting incidents are used audited annually
A
Plan,Research,Observe,analyze,ada Research,test,plan,adapt,ana Plan,Observe,analyze,improve,te Observe,research,analyze,adapt,pla
4 That is the correct sequence for benchmark processes in BPR Projects
pt,Improve lyze,improve st n,imprlement
A
Which of the following represents the hirarchy of controls from highest level to lowest General,Pervasive,detailed,applicat Pervasive,general,application Detailed,pervasive,application,de Application,general,detailed,pervasi
5
level ion ,detailed tailed ve
C
6 What is the purpose of ARP Address resolution protocol Find the IP Address Find the mailing address Find the MAC Address Find the domain name C
Filling system for storage and Detection of system
7 Which of the following is not a function of the OS
retrival penetration
User interface(Shell) Security function with event logging A
Which of the following helps to gaina clear understanding of the Clear understanding of
8
the Business process while developing BCP
BC Strategy Business recovery strategy Risk assessment Threat management C
9 Who is responsible for Desugnating the appropriate information classification level Data custodian Data user Data owner Security manager C
10 Which of the following protocols is likely to be used for monotoring health of Network OSI SNMP SMTP RIP B
Following the organisation
Which of the following is the MOST important element for the successful implementation Identification of Organisation
11
of IT Governance strategies
Perform a risk assessment Perform a threat analysis policy,Standard and the best A
practices
Which of the following data validation edits is effective in detecting transposition and
12
transcription errors
Range Check Check digit Validity Check Duplicate Check B
Annual meeting the senior
What is the best way to ensure the organisational policies comply with the legal Periodic review of the policies by management to discuss
13
requirements subject matters Experts whether the policies comply
Updating the policies regularly Conduct compliance test regularly D
with the legal requiremet
Which is the name of the decentralized control method enabling someone to make a
14
decission based on their own options
Executive Discretionary Detailed Mandatory B
Developers have access and can
When an individual in an IT department Perform more than one role, Which one of the Business analysts are doing IT supports team perform data IT managers perform as a system
15
following poses the greatest risk
mitigate data to the Production
software functional testing backup administrators
A
environment
Can be used in a switchboard
16 Which of the following is a benfit of using callback devices Provide an audit trail
environment
permit unlimited user mobility allow call forwarding A
17 Which of the following is not one of the three major control types Detective Deterrent Preventive Corrective B
Using PKI encryption which key is used by the sender for authentication of the receiving
18
Party
Sendors PVT KEY Recipients PVT KEY Recipients Public Key Senders Public Key C
Presentation,Datalink,Netwo Application,Presentation,Session,
Application,Physical,Session,Transp Presentation,Network,Datalink,Tran
19 Which of the following is a list of OSI model levels From the top down
ort,Network,Datalink,Presentation
rk,Transport,Network,Sessio Transport,Network,Datalink,Phys
sport,Session,Physical,Application
C
n,Physical,Application ical
An offsite Information Processing facility having electrical writing, air conditioning and
20
flooring,but no computer or communications equipment is a
COLD SITE Warm site Dail up site Duplicate processing facility A

You might also like