Professional Documents
Culture Documents
Fall 2008
CS507- Information Systems (Session - 1)
False
True
Cold Site
Warm Site
Hot Site
Third Party Arrangements
True
False
False
True
Anti virus
Scanners
Firewall
Password
Internet
Intranet
Wireless communication
None of above
Information
Data
Log file
None of above
BPR
CSF
SPR
Modular approach
Incremental approach
Traditional approach
Derived approach
True
False
Question No: 25 ( Marks: 1 ) - Please choose one
In assessing risks for an IT system, _______________ is the first step.
To define the scope of the effort.
Vulnerability Assesment
threat identification
Question No: 26 ( Marks: 1 ) - Please choose one
True
False
True
False
True
False
Define Firewall.