CS507 Quiz Dated 30-07-2010
1. Which of the following systems need a comprehensive definition of the known
and expected behavior of systems?
Select correct option:
Firewalls
Network-based IDS
Signature-based IDS
Statistical-based IDS
Ref: Statistical-based: These systems need a comprehensive definition of the known and
expected behavior of systems.
2. Risk impact assessment should focus on consequences affecting _____
Select correct option:
Planning, resources, cost, schedule
Marketing, costing, staffing
Performance, cost, schedule
Business, technology, process
Reference
3. An intruder carry out unauthorized activity by impersonating a legitimate user of
the system incase of________________.
Select correct option:
Eavesdropping
Masquerading
Piggybacking
Spoofing
Ref: Masquerading – involves carrying out unauthorized activity by impersonating a
legitimate user of the system.
4. ________ are installed at the point where network connections enter a site.
Select correct option:
Antivirus
Bridges
Routers
Firewalls
Ref: Firewalls are defined as a device installed at the point where network connections
enter a site; they apply rules to control the type of networking traffic flowing in and out.
5. Incase of __________, an intruder fools a user into thinking they are interacting
with the operating system.
Select correct option:
Spoofing
Piggybacking
Eavesdropping
Trojan horse
Ref: Spoofing – A penetrator fools users into thinking they are interacting with the
operating system. He duplicates logon procedure and captures pass word.
6. Which of the following when together, break down the geographical and time
barriers?
Select correct option:
Mobility and Speed
Reachability and Accessibility
Mobility and reachability
Remote access and Speed
Ref: Mobility implies that the Internet access travels with the customers. M-commerce is
appealing because wireless offers customers information from any location. This enables
employees to contact the office from anywhere they happen to be or customer.
Reachability means that people can be contacted at any time, which most people see as a
convenience of modern life. These two characteristics – mobility and reachability break
the geographical and time barriers.
7. Internet is vulnerable to attacks because of its ___________
Select correct option:
scope
nature
global access
speed
Ref: The nature of the internet makes it vulnerable to attack.
8. What would affect the impact’s scope if a risk does occur?
Select correct option:
Risk cost
Risk timing
Risk scope
Risk resources
9. Under which of the following agreement, two or more organizations agree to
provide backup facilities to each other in case of one suffering from a disaster.
Select correct option:
Mutual
Cooperative
Reciprocal
Joint
Ref: Reciprocal Agreement_ Two or more organization might agree to provide backup
facilities to each other in the event of one suffering a disaster. This backup option is
relatively cheap, but each participate must maintain sufficient capacity to operate
another’s critical systems. Reciprocal agreements are often informal in nature.
10. Risks are rated by ____
Select correct option:
Probability and impact
Probability and cost
Probability and size
Probability and exposure
Reference
11. Which of the following apply rules to control the type of networking traffic
flowing in and out?
Select correct option:
Data analyzers
Firewall
Antivirus
Modem
Ref: Firewalls are defined as a device installed at the point where network connections
enter a site; they apply rules to control the type of networking traffic flowing in and out.
The purpose is to protect the Web server by controlling all traffic between the Internet
and the Web server.
12. Automated tools can be used to
Select correct option:
On site reviews
Information elicitation
Threat identification
Maintain system integrity
13. Which of the following is applicable to environments with stable demand
patterns?
Select correct option:
Built to order supply chain
JIT
Made to store supply chain
Continuous replenishment supply chain
Ref: Continuous Replenishment – focuses on constant replacement of inventory by
working closely with suppliers. Applicable to environments with stable demand patterns.
14. Data packets are routed across a network with the help of_______________.
Select correct option:
FTP protocol
HTTP protocol
TCP protocol
Internet Protocol
Ref: The Internet Protocol is designed solely for the addressing and routing of data
packets across a network.
15. Which of the following involves intercepting communications between the
operating system and the user?
Select correct option:
Eavesdropping
Masquerading
Piggybacking
Spoofing
Ref: Piggybacking – involves intercepting communications between the operating
system and the user and modifying them or substituting new messages.
16. ________ site backup is an appropriate choice for organizations if fast recovery is
critical.
Select correct option:
Hot
Cold
Cool
Warm
Ref: Hot sites
If fast recovery is critical, an organization might need hot-site backup. All hardware and
operations facilities will be available at the hot site. In some cases, software, data, and
supplies might also be stored there. Hot sites are expensive to maintain. They usually are
shared with other organizations that have same hot site needs.
17. Which of the following phase determines the adverse impact resulting from a
successful threat exercise of vulnerability?
Select correct option:
Risk resilience
Monitoring threats
Likelihood determination
Impact analysis
Ref: Impact analysis
The next major step in measuring level of risk is to determine the adverse impact
resulting into a successful,exercise of vulnerability.
18. Threat likelihood is determined to use in____
Select correct option:
Impact analysis
Assessment process
Control recommendation
Vulnerability identification
19. __________ supply chain segment includes all the processes to transform inputs
to outputs.
Select correct option:
Downstream
Internal
Upstream
Middle stream
Ref: Upstream supply chain segment – includes the organization’s first-tier suppliers
(manufacturers and assemblers). The major activities are purchasing and shipping.
• Internal supply chain segment – includes all the processes to transform inputs to
outputs.
• Downstream supply chain segment – includes distributing, delivering to customer and
final consumption of the product.
20. Threat identification can be verified using
Select correct option:
Threat statement
Threat source
Threat action plan
Threat impact analysis
Ref: Information is used as an input to determine and identify what kind of threats the
system is exposed to history of system attack, data from intelligence agencies. The out
put of this phase is a threat statement identifying and defining threats.
21. ______________ refers to the structured transmission of data between
organizations via electronic means.
Select correct option:
DEI
EDI
CDI
IDE
Ref: EDI is a set of standards for structuring information to be electronically exchanged
between and within businesses, organizations, government entities and other groups.
22. ___________ refers to the constant replacement of inventory by working closely
with suppliers.
Select correct option:
Continuous replenishment
Made to store
JIT
Built to order
Ref: Continuous Replenishment – focuses on constant replacement of inventory by
working closely with suppliers. Applicable to environments with stable demand patterns.
23. Firewalls ________ data packets which are sent between different physical
locations within an organization.
Select correct option:
facilitate
Encrypt
restrict
allow
Ref: Firewalls encrypt packets that are sent between different physical locations within
an organization by creating a VPN over the Internet.(Page NO.178)
24. An effective risk management strategy will need to address _____
Select correct option:
Business continuity planning
Risk avoidance
Risk monitoring
All of these
Reference
25. Which of the following is the act of secretly listening to the private conversation
of others without their consent?
Select correct option:
Eavesdropping
Spoofing
Masquerading
Piggybacking
Reference
26. Which of the following is not simply redesigning of certain input forms but also
includes changing of working practices?
Select correct option:
BPR
ERP
BRP
ERD
Ref: BPR was not simply of redesigning certain input forms but involved changed
practices of working. It involved change in human thought and approaches to their
routine, mundane tasks. This raised issues of Change Management.
27. Which of the following is in fact the risk mitigation process?
Select correct option:
Risk determination
Control recommendations
Control measures
Risk pliability
Ref: The control recommendations are the results of the risk assessment
process. The control recommendations is actually the risk mitigation process.
28. Which of the following refers to the online delivery of information for the
purpose of education, training and knowledge management etc?
Select correct option:
E-Banking
E-Commerce
E-Business
E-Learning
Ref: It is a web - enabled system that makes knowledge accessible to those who need it,
when they need it – anytime, anywhere. E-learning is useful for facilitating learning at
schools.
29. Internet protocol ____________ provide evidence on the delivery of messages.
Select correct option:
mostly
does not
does
up to some extent
Ref: The Internet Protocol is designed solely for the addressing and routing of data
packets across a network. It does not guarantee or provide evidence on the delivery of
messages. There is no verification of an address. The sender will not know if the message
reaches its destination at the time it is required.
30. An IT enabled organization that involves the radical re-conceptualization of the
business needs ___ for possible threat invasion
Select correct option:
Impact analysis plan
Business continuity plan
Data backup
Control recommendation
31. Which of the following is the main reason of B2C thriving in technologically
advanced societies?
Select correct option:
Vast scope and acceptability
Reachability
Break down of physical barriers
Low costs
Ref: The real reason that B2C is flourishing in technologically advanced societies is that
it has broken down ‘physical’ barriers to doing business.
32. Which of the following IDS will not be able to detect all types of intrusions due to
limitations of detection rules?
Select correct option:
Network-based
Node-based
Signature-based
Statistical-based
Ref: Signature-based IDSs will not be able to detect all types of intrusions due to the
limitations of detection rules. On the other hand, statistical-based systems may report
many events outside of the defined normal activity but which are normal activities on the
network.
33. Effective Business continuity plans can not be executed without proper
Select correct option:
Control recommendation
Control implementation
Control management
Control monitoring
34. What could be the first step in any corporate risk strategy?
Select correct option:
Risk identification
Control implementation
Characterization
Documentation
35. Which of the following supply chain segment includes the organization’s first tier
suppliers?
Select correct option:
Internal
Downstream
Middle stream
Upstream
Ref: Upstream supply chain segment – includes the organization’s first-tier suppliers
(manufacturers and assemblers). The major activities are purchasing and shipping.
36. People can be contacted at any time, refers to:
Select correct option:
Mobility
Instant access
Remote access
Reachability
Ref: Reachability means that people can be contacted at any time, which most people see
as a convenience of modern life.
37. Which of the following network attacks involves probing for network
information?
Select correct option:
Passive attacks
Active attacks
Masquerading
Spoofing
Explanation: By probing for network information, the intruder obtains network
information as that can be used to target a particular system or set of systems during an
actual attack.
38. Which of the following uses internet and online technologies to create operating
efficiencies and therefore increase value to the customer?
Select correct option:
Internet
E-business
IDS
CRM
Ref: E-business means using the internet and online technologies to create operating
efficiencies, and therefore increase value to the customer. All e-commerce is part of e-
business. Not all e-business is e-commerce.
39. Which of the following works in conjunction with routers and firewalls by
monitoring network usage anomalies?
Select correct option:
SDLC
IDS
ISD
DCS
Ref: An IDS works in conjunction with routers and firewalls by monitoring
network usage anomalies. It protects a company’s information systems resources from
external as well as internal misuse.
40. _________ controls the most vulnerable point between a corporate network and
the internet.
Select correct option:
Firewall
Sensors
Data analyzers
Spoofing
Ref: Firewalls are hardware and software combinations that are built using routers,
servers and variety of software. They should control the most vulnerable point between a
corporate network and the Internet.
41. _________ refers to the ability of a system to handle growing amounts of work in
a graceful manner.
Select correct option:
Scalability
Consistency
Security
Clustering
Ref from wikipedia: scalability is a desirable property of a system, a network, or a
process, which indicates its ability to either handle growing amounts of work in a
graceful manner or to be readily enlarged.
42. Impact needs to be measured to
Select correct option:
Identify threat
Record thread history
Worse scenarios of impact
Define the data criticality
Ref: Impact needs to be measured by defining certain levels. E.g. high medium low as
qualitative categories or quantifying the impact by using probability distribution.
• Mission Impact Analysis
• Assess criticality assessment
• Data criticality
• Data sensitivity
43. __________ is a program which undertakes unauthorized activities but looks
legitimate. Select correct option:
Trojan horse (Not Sure)
Virus
Worms
Spyware