You are on page 1of 16

Assignment A

1.
2.
3.
4.
5.
6.
7.
8.

What are the 4 jobs of an operating system ?


How does the Operating system keep track of the different disk drives ?
What kind of natural hazards are not normally insurable ?
Describe the trends in disaster mangement.
What is network security and how does it protect you ?
What is the Microsoft Encrypting File System and what are some of its
features ?
What is computer Security ?
Discuss the concept of Local Security Policies

Assignment B
1.
2.
3.

What is the user authentication concept ?


Discuss the key mechanism of Firewall.
Define the term "Disaster" and describe its classification.

Assignment C
Question No. 1

Marks 10

In computer security............. means that the computer sytem assets can be modified
only by authorized parties
Options
Confidentiality
Integrity
Availability
Authencity

Question No. 2
A computer security................ means that the information in acomputer sytem only
can be accessible for reading by authorized parties
Options

Marks 10

confidentiality
Integrity
Availibility
Authencity

Question No. 3

Marks 10

Which of the following is independent malicious program that need not any host
programe ?
Options
Trap Doors
Trojan horse
virus
worm

Question No. 4

Marks 10

The .................... is code embedded in some legitimate program that is set to


explode when certain conditions are met
Options
Trap doors
Trojan horse
Logic bomb
virus

Question No. 5

Marks -

10
which of the following malicious prog do not replicate authomatically ?
Options
Trojan Horse
Virus
Worm
Zombie

Question No. 6

Marks 10

......................Programs can be used to accomplish functions indirectly that an


unauthorized user not accomplish directly
Options
Zombie
worm
Trojan horse
Logic Bomb

Question No. 7
state whether true of falls 1.A worm mails a copy of itself to other system 2.a worm
executes a copy of itself on another system
Options
true, false
false, true

Marks 10

true, true
false, false

Question No. 8

Marks 10

............ are used in denial of service attacks, typically against targeted web sites
Options
Worm
Zombie
Virus
Trojan horse

Question No. 9

Marks 10

..................... is a form of virus explicitely designed to hide itself from detection by


antivirus software
Options
Stealth Virus
Polymorphic virus
Parastic virus
macro virus

Question No. 10
State whether the following statement is true 1. A macro virus is paltform
indepecent 2. Macro viruese infect documents, not executabel portions of code

Marks 10

Options
1 only
2 only
both 1 & 2
none

Question No. 11

Marks 10

The type of auto executing macros, in microsoft word is/are


Options
auto execute
auto macro
command macro
all of the above

Question No. 12
In.................... the virus places an identical copy of itself into other programs or
into certain sytem areas on the disk
Options
Dormat phase
Propagation phase
Triggering Phase
execution phase

Marks 10

Question No. 13

Marks 10

In the world of computing, the essential element that controls how computers are
used is
Options
ethics
legal laws
security requiremnts
business demands

Question No. 14

Marks 10

The guidelines for the morally acceptable use of computers in socitey are
Options
computer ethics
privacy
morality
legal system

Question No. 15
The issues that deal with the collection and use of data about individuals is
Options
access
property

Marks 10

accuracy
privacy

Question No. 16

Marks 10

The ethical issue concerned with the correctness of data collected is


Options
access
property
Exactness
privacy
Question No. 17

Marks - 10

The ethical issue that involves who is able to read and use data is
Options
access
property
accuracy
privacy

Question No. 18
The vast industry involves the gathering and selling of personal data is
Options
direct marketing

Marks 10

fund raising
information reselling
government agencies

Question No. 19

Marks 10

The first step in developing a Business Continuity Plan (BCP) is developing a:


Options
Business Impact Analysis
Risk Analysis Sheet
Risk Mitigation Document
Risk Assess ment Sheet

Question No. 20

Marks 10

An analysis of threats based on impacts and prioritizing business disruptions based


on severity and occurrence comes under the second step of developing a BCP,
which is:
Options
Risk Monitoring
Risk Assessment
BIA
Risk Management

Question No. 21
Testing the BCP regularly comes under the phase:

Marks 10

Options
Risk Assessment
BIA
Risk Monitoring
Risk Management

Question No. 22

Marks 10

Effectiveness of a BCP can be validated through


Options
Monitoring
Assessment
Feedback
Testing
Question No. 23

Marks - 10

By using "__________" option in Windows, you can limit the ability of users and
groups to perform various actions by assigning permissions.
Options
Network and Internet
Hardware and Sound
Programs
Local Users and Groups

Question No. 24

Marks 10

A Windows NT ______ is the administrative unit of directory services.


Options
Directory
File
Domain
Folder

Question No. 25

Marks 10

Domains, Folders, Objects are a part of ________ structure of Windows OS.


Options
Physical
Logical
Both Physical and Logical
None of the above

Encrypting File System (EFS) is a feature of:


Options
Microsoft Windows
iOS
Linux
Unix

Question No. 27

Marks - 10

Cyber-attack is a kind of:


Options
Natural Disaster
Man-Made disaster
Both
None of the above

Question No. 28

Marks 10

Which password management feature ensures that a user can not re use a password
for a specific time?
Options
Account Locking
Password Verification
Password History
Password Ageing

Question No. 29
Composing hard-to-guess passwords is a good practice.
Options
FALSE
May or May not be TRUE
TRUE
Not Sure

Marks 10

Question No. 30

Marks 10

Study of encryption algorithms in order to find weaknesses in the system so as to


retrieve plain text from cipher text without knowing the key/algorithm.
Options
Cryptography
Key Analysis
Algorithm Analysis
Cryptanalysis

Question No. 31

Marks 10

Capital 'A' in CIA triangle stands for:


Options
Availability
Authorization
Authentication
Algorithm

Question No. 32
When the sender and receiver do not have a possibility of denying sending or
receiving data, it is called the principle of:
Options
Confidentiality

Marks 10

Non-repudiation
Repudiation
Integrity

Question No. 33

Marks 10

While Symmetric key cryptography utilizes ___ key(s) for encryption, the
asymmetric key cryptography uses ___ key(s).
Options
1,2
2,1
1,1
2,3

Question No. 34

Marks 10

A software application that monitors network and system activities for malicious
content and policy violations is termed as:
Options
Firewall
Anti-Virus
Anti-Malware
Intrusion Detection System

Question No. 35
During an earthquake in Nepal, many computers were destroyed with significant

Marks 10

data. This is a kind of:


Options
Accidental Error
Malicious use
Unauthorized access
Physical Threat

Question No. 36

Marks 10

Process to eliminate means of attack by patching vulnerabilities and turning off


inessential services is called:
Options
Malicious Code elimination
Attack Prevention Mechanism
Hardening
Disaster Management

Question No. 37
The local security policy of a system is a set of information regarding the security
of a local computer. It includes trusted _____, ______ accounts and ______
assigned to the accounts.
Options
Users, domain, privileges
Domains, user, privileges
Privileges, user, domains

Marks 10

None of the above

Question No. 38

Marks 10

Administrator and Guest are examples of ____ user accounts.


Options
Default
Explicit
Implicit
None of the above

Question No. 39

Marks 10

Rahul, an IT Engineer, while working on his system, noticed that a new Notepad
tab has popped out and a message is being typed. This is an example of
Options
Unauthorized Access
Malicious Code
Network Attack
Password Attack

Question No. 40
A secret entry point in the code which could be exploited by malicious users is
called:
Options

Marks 10

Virus
Worm
Trapdoor
Trojan Horse