You are on page 1of 2

NAME: ____________________________________ MATRIC NO:______________________________

DTT 4034 – ICT AND NETWORK SECURITY

TUGASAN TOPIK DISASTER PREVENTION AND RECOVERY

ARAHAN : Tandakan jawapan yang betul dengan Text Hightlight Color Green

1. If you receive an e-mail offering to remove you from a mailing list, what should you do?
a. Do not respond
b. Call the local police
c. Respond promptly
d. Wait a week to see if the offer is repeated

2. Which of the following is not anti-viruses software?


a. NAV
b. F-Prot
c. Oracle
d. McAfee

3. Best quality of DR 'Disaster Recovery' is


a. DR site in the same campus
b. DR site in the same city
c. DR site in the same country
d. DR site in a different country

4. A deadlock exists in a system if and only if the wait for graph


a. has a cycle in it
b. has a path from first node to last node
c. is a tree
d. has a layout in it

5. Backup of the source data can be created


a. on the same device
b. on another device
c. at some other location
d. all of these

6. Remote backup site is sometimes called the


a. primary site
b. secondary site
c. ternary site
d. main site

7. Backup technique which is most space efficient is


a. full backup
b. incremental backup
c. differential backup
d. built-in backup

8. To decide on a backup strategy for your organization, we should consider


a. RPO
b. RTO

1
c. Both a and b
d. ROM

9. Technique which can be used to optimize backed up data space is


a. encryption
b. compression
c. deduplication
d. Both b and c

10. Example of backup software is


a. Amanda
b. Bacula
c. IBM Tivoli Storage Manager
d. all of these

11. The most devastating loss to a company is


a. loss of hardware
b. loss of data
c. loss of software
d. loss of printouts

12. Security protection for personal computers includes


a. internal components
b. locks and cables
c. software
d. all of these

13. Internal security of a system deals with


a. Databases
b. Software
c. Cryptography
d. Authorization

14. Access control is granted to users after qualifying for


a. Authorization
b. Authentication
c. Cryptography
d. Regular expressions

15. Social engineering is:


a. A website created for people who share common interests.
b. Scams distributed through email such as phishing, pharming and impersonation.
c. A targeted attack on a personal computer.
d. None

End of question papers

You might also like