You are on page 1of 2

AKI’s

Poona Institute of Management Sciences & Entrepreneurship


Introduction to Cyber Security: Module 2
Security Management
Name: Date:
Course: Year: Roll No:
Total marks :25

SECTION-I
1. CERT stands for (1 mark)
a. Computer Emergency Response Team
b. Cyber emergency responsible team
c. Cyber eligible responsible team
d. Cyber evaluation requisite team

2. _________ are a first line of defense when it comes to controlling access to protected systems and
information. (1 mark)
a. Codes
b. Password
c. Keys
d. users

3. What does PDCA stand for ? (1 mark)

a. Plan – Do – Check – Act


b. Prepare-Direct-Check –Act
c. Plan-Diagnose-Circulate-Act
d. Plan-Do-Ciculate-Act

4. Which security measures are needed to protect data during transmission? (1 mark)

Network security measures are needed to protect data during their transmission

5. The generic name for the collection of tools designed to protect data and to thwart hackers is
computer security (1 mark)
a) Network security
b) Computer security
c) Information security
d) Hardware security

6. Network security measures are needed to protect data during their ________ (1 mark)
a) transmission.
b) Reception
c) Initiation
d) Termination

7. In _____________ the receiver needs to be .sure of the sender's identity (1 mark)


a. Message Integrity
b. Message availability
c. Message transmission
d. Message authentication

Section-II
Answer the following

Q2.Describe some features of ISMS (Information Security Management Systems) (4 marks)

Q3. Explain in brief the best practices for Network Security Management (4 maks)

You might also like