Professional Documents
Culture Documents
28. Which products are people most likely to be more uncomfortable buying on the Internet?
A ) Books B) Furniture
C ) Movies D) All of these
29. Which products are people most likely to be comfortable buying on the Internet?
A ) Books B) PCs
C ) CDs D) AU of these
Which one of the following do NOT come under FBT (Fringe Benefits Tax)?
A ESOPs
B Super annuation fund
C Rent allowance
D Employers expense on travel
The process of buying and selling product or services and transfer of fund electronically is .....
A E - book
B E - mail
C E learning
D E – commerce
Which one is not a protocol for carrying authentication, Authorization and Accounting formation between
Network Access servers?
A TACACS+
B Diameter
C RADIUS
D MAC
Expansion of TDS is
A Total Deduction of Surplus
B Tax Deducted at Sources
C Tax Deducted at Surplus Total Deduction on Sales
Liabilities which will be redeemed after a long period of time say 10 to 15 years are called
A long term liabilities
B short term liabilities
C contingent liabilities
D current liabilities
In SDLC (Software Development Life Cycle), What comes after "Design" phase?
Release phase
Requirement phase
Implementation phase
D Verification phase
Q. Which menu is used to create new ledgers, groups and voucher types in Tally?
A) Reports B) Import C) Transactions D) Masters
Q.Which of the following shows daily balance for a selected voucher type?
A) Daybook B) trial Balance C) Balance Sheet D) None of these
Q. In a typical indormation security program, what is the primary responsibility of information(data) owner?
A. Ensure the validity and accuracy of data
B. Determine the information sensitivity or classification level
C. Monitor and audit system users
D. Ensure availability of data
Q. A system security engineer is evaluation methods to store user passwords in an information system, so
what may be the best method to store user passwords and meeting the confidentiality security objective?
A. Password –protected file B. File restricted to one individual
C. One –way encrypted file D Two way encrypted file
Q. what is the inverse of confidentiality , integrity, and availability(C.I.A) triad in risk management?
A Misuse ,exposure ,destruction
B Authorization, non –repudiation, integrity
C Disclosure, alteration, destruction
D Confidentiality , integrity, availability
Q. Security of an automated information system is most effective and economical if the system is
………….
A. Optimized prior to addition of security
B Customized to meet the specific security threat
C Subjected to intense security testing
D Designed originally to meet the information protection needs