You are on page 1of 4

Summary

Question No Question

End Test
Attempted

Question 1 Which of the following is an example of biometric technology ? Question 2 technology ? Question 3 What is full form of ACL ? Question 4 Which one is the method of mandatory access control ? Question 5 What is the full form of RBAC? Question 6 Which one of the following is one of the access modes ? Question 7 operation until permanent repair is made ? Question 8 What is the full form of RFID ? Question 9 possible ? Question 10 What is the full form of DVR ?
Which material is used for lamination in case of magnetic stripe

Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes

What do we call it that allows the system to continue normal

How many camera images can be viewed in multi viewer that are

Question 11 transmitting visible or infrared light beams?

Which beam system detects the presence of an intruder by What is the process of tying a network protocol to another

Question 12 protocol or NIC? Question 13 What is a functional computer system on a single chip? Question 14 Which RFID tag does not contain battery?

Question 15 complete source of power for the tag's circuitry and antenna? Question 16 Can we replace a UPS in place of a Generator? Question 17 RG-59 cable is used for_________? Question 18 An alarm system can trigger______. Question 19 Entry Time Delay in an Intruder alarm system is_________. Question 20 Which video format is used in india? Question 21 Multiple RFID tags can be scanned by__________. Question 22 A SMPS is being used in_________. Question 23 In PAL format Real Time motion picture contains__________. Question 24 DVR?

Which tag is equipped with battery that can be used as a partial or

What can we do by decreasing frame rate in recording mode in Which lens offers a lineup of standard,wide-angle and super-

Question 25 wide-angle versions,all with a fixed angle of view? Question 26 Which virus infects every 20th time a file is executed ? Question 27 Can we configure to allow or disallow cookies ? Question 28 What is the name of software which is used to remove virus ? Question 29 What do we call to files which keep history of system ? Question 30 What is the name of layer 3 ? Question 31 Which standards Wi-Fi applies ?

Question 32 networks into a single LAN ? Question 33 Which command on a router is used to create banners ? Question 34 value of configuration register ? Question 35 Which layer does TCP works at? Question 36 An IP works at which layer of OSI model ? Question 37 What is maximum speed supported by 802.11b? Question 38 The golden rules or policies for password is______? Question 39 A firewall is a_______? Question 40 data.

What do we call to a device that connects two or more remote

Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes

When we want to ignore startup configuration file what will be

Preventing, detecting or deterring the improper modification of the Preventing, detecting or deterring the unauthorized Denial of

Question 41 Service to data. Question 42 Examples of specific detection methods are________. Question 43 does not get immediate feedback. Question 44 is_______.

Predicts responses from a host,allowing commands to be sent,but Some of the important security issues related to anti-virus The spoofing computer often doesn't have access to user-level

Question 45 commands so attempt to use automation-level services, such as


email or message handlers, are employed to implement its attack.

Question 46 Which trust model in cryptography is the simplest? Question 47 plaintext the user is signing? Question 48 Which of the following devices creates a network perimeter? Question 49 Which of the following can cause misrouting of e-mail?
Which of the following algorithms has been adopted as a Which cryptographical method has strong hash function on the

Question 50 successor to the Data Encryption Standard (DES)? Question 51 Backup of complete data on hard disk is known by which name ?
What do we call to a site which will have basic environmental

Question 52 controls necessary to operate but will have a few of computing


components necessary for processing ?

Question 53 What is current capacities of magneto optical disks ? Question 54 Which one is not a part of principle operating security system? Question 55 What is the full form of PKI ? Question 56 systems and applications ? Question 57 Which files are very helpful in security analysis ?
What do we call to the process of ensuring that Which management is required for the number of vulnerabilities in

Question 58 policies,procedures and regulations which are carried out in a Question 59


consistent manner with an organisation ? What do we call to a site which is configured in the same way as a primary site ?

Question 60 What do we refer to tracking the usage of public building or site ?

Question 61 What is the full form of CCTV ? Question 62 pupil eye?


Which is the colored ring of textured tissue that surrounds the Fingerprint matching techniques can be placed in which two Which visitor management system records basic information

Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes

Question 63 categories?

Question 64 about visitors to a public building or site in log book? Question 65 BCP stands for______.

Question 66 appropriately and consistently with organizational policies? Question 67 confidentiality of private information?
Which policy identifies the level of care used to maintain the Which contractual agreement between entities describing

Which does it verifies that system & software are used

Question 68 specified levels of service that the servicing entity agrees to Question 69 Question 70 Question 71 Question 72 Question 73 Question 74 Question 75 Question 76
guarantee for the customer? Backup which copies all selected files but does not mark each file as having been backed up is called_________. Backup which copies all selected files that have been modified the day is called_________. Which is the process of increasing permissions? What includes security management ? Which exposes an organisation to possible damages? What are the advantages of hot site? What are the advantages of warm & cold site? What cracker does not do on a system ? Programmes which are triggered by specific events and affect our

Question 77 system ? Question 78 Trojans are not spread through _________. Question 79 Who monitors firewall log reports of intrusion ? Question 80 What is the full form of IDS ? Question 81 What do the keyloggers do ? Question 82 Which port has to be blocked for disabling netbios file sharing ? Question 83 Where does residency program stay ? Question 84 Which of the following are worm types ? Question 85 What are techniques used to achieve Integrity ? Question 86 many step process ? Question 87 Which of the following is commonly used encryption method ? Question 88 When was SHA developed ? Question 89 When was MD2 developed ? Question 90 What does RA stands for ? Question 91 Digital cerificate is a combination of _________? Question 92 What are different fields of digital certificate ?
The authentication process used by TACACS consists of how

Question 93 session are known as what ? Question 94 Which technique is used for E-mail spoofing ? Question 95 part of a transaction? Question 96 another?

The cookies which are valid only for lifetime of your current

Yes Yes Yes Yes Yes Yes Yes Yes

What service represents the inability to deny participation in all or What type of file appears to do one thing but actually does What can a security administrator create to trap a hacker or force

Question 97 him or her to leave behind evidence of tampering? Question 98 What can you use to locate a hacker's origin? Question 99 How are CAs administered? Question A trojan horse is _________program. 100

You might also like