Professional Documents
Culture Documents
Question No Question
End Test
Attempted
Question 1 Which of the following is an example of biometric technology ? Question 2 technology ? Question 3 What is full form of ACL ? Question 4 Which one is the method of mandatory access control ? Question 5 What is the full form of RBAC? Question 6 Which one of the following is one of the access modes ? Question 7 operation until permanent repair is made ? Question 8 What is the full form of RFID ? Question 9 possible ? Question 10 What is the full form of DVR ?
Which material is used for lamination in case of magnetic stripe
Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
How many camera images can be viewed in multi viewer that are
Which beam system detects the presence of an intruder by What is the process of tying a network protocol to another
Question 12 protocol or NIC? Question 13 What is a functional computer system on a single chip? Question 14 Which RFID tag does not contain battery?
Question 15 complete source of power for the tag's circuitry and antenna? Question 16 Can we replace a UPS in place of a Generator? Question 17 RG-59 cable is used for_________? Question 18 An alarm system can trigger______. Question 19 Entry Time Delay in an Intruder alarm system is_________. Question 20 Which video format is used in india? Question 21 Multiple RFID tags can be scanned by__________. Question 22 A SMPS is being used in_________. Question 23 In PAL format Real Time motion picture contains__________. Question 24 DVR?
What can we do by decreasing frame rate in recording mode in Which lens offers a lineup of standard,wide-angle and super-
Question 25 wide-angle versions,all with a fixed angle of view? Question 26 Which virus infects every 20th time a file is executed ? Question 27 Can we configure to allow or disallow cookies ? Question 28 What is the name of software which is used to remove virus ? Question 29 What do we call to files which keep history of system ? Question 30 What is the name of layer 3 ? Question 31 Which standards Wi-Fi applies ?
Question 32 networks into a single LAN ? Question 33 Which command on a router is used to create banners ? Question 34 value of configuration register ? Question 35 Which layer does TCP works at? Question 36 An IP works at which layer of OSI model ? Question 37 What is maximum speed supported by 802.11b? Question 38 The golden rules or policies for password is______? Question 39 A firewall is a_______? Question 40 data.
Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Preventing, detecting or deterring the improper modification of the Preventing, detecting or deterring the unauthorized Denial of
Question 41 Service to data. Question 42 Examples of specific detection methods are________. Question 43 does not get immediate feedback. Question 44 is_______.
Predicts responses from a host,allowing commands to be sent,but Some of the important security issues related to anti-virus The spoofing computer often doesn't have access to user-level
Question 46 Which trust model in cryptography is the simplest? Question 47 plaintext the user is signing? Question 48 Which of the following devices creates a network perimeter? Question 49 Which of the following can cause misrouting of e-mail?
Which of the following algorithms has been adopted as a Which cryptographical method has strong hash function on the
Question 50 successor to the Data Encryption Standard (DES)? Question 51 Backup of complete data on hard disk is known by which name ?
What do we call to a site which will have basic environmental
Question 53 What is current capacities of magneto optical disks ? Question 54 Which one is not a part of principle operating security system? Question 55 What is the full form of PKI ? Question 56 systems and applications ? Question 57 Which files are very helpful in security analysis ?
What do we call to the process of ensuring that Which management is required for the number of vulnerabilities in
Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Question 63 categories?
Question 64 about visitors to a public building or site in log book? Question 65 BCP stands for______.
Question 66 appropriately and consistently with organizational policies? Question 67 confidentiality of private information?
Which policy identifies the level of care used to maintain the Which contractual agreement between entities describing
Question 68 specified levels of service that the servicing entity agrees to Question 69 Question 70 Question 71 Question 72 Question 73 Question 74 Question 75 Question 76
guarantee for the customer? Backup which copies all selected files but does not mark each file as having been backed up is called_________. Backup which copies all selected files that have been modified the day is called_________. Which is the process of increasing permissions? What includes security management ? Which exposes an organisation to possible damages? What are the advantages of hot site? What are the advantages of warm & cold site? What cracker does not do on a system ? Programmes which are triggered by specific events and affect our
Question 77 system ? Question 78 Trojans are not spread through _________. Question 79 Who monitors firewall log reports of intrusion ? Question 80 What is the full form of IDS ? Question 81 What do the keyloggers do ? Question 82 Which port has to be blocked for disabling netbios file sharing ? Question 83 Where does residency program stay ? Question 84 Which of the following are worm types ? Question 85 What are techniques used to achieve Integrity ? Question 86 many step process ? Question 87 Which of the following is commonly used encryption method ? Question 88 When was SHA developed ? Question 89 When was MD2 developed ? Question 90 What does RA stands for ? Question 91 Digital cerificate is a combination of _________? Question 92 What are different fields of digital certificate ?
The authentication process used by TACACS consists of how
Question 93 session are known as what ? Question 94 Which technique is used for E-mail spoofing ? Question 95 part of a transaction? Question 96 another?
The cookies which are valid only for lifetime of your current
What service represents the inability to deny participation in all or What type of file appears to do one thing but actually does What can a security administrator create to trap a hacker or force
Question 97 him or her to leave behind evidence of tampering? Question 98 What can you use to locate a hacker's origin? Question 99 How are CAs administered? Question A trojan horse is _________program. 100