You are on page 1of 7

Programme: SYBMS

Class and Semester: Second Year and III


Subject: ITBM
Unit-4 Chapter: 19- E-Security system
Asst Prof. Archana Sanap

Sr.no. Questions option 1 option 2


1 To protect computer system from the list not mentioned Internal
p External
2 The non-physical threats are also known as _______ Logical Threats Physical Threats
3 The following list is the common types of non-physical thVirus Trojans
4 __________ one of the most harmless where it programm Worms Trojans
5 _________ something that keeps a record of every keyst Key Loggers Adwary
6 Website get hacking and issues therein: Access control Softwre vernabilites
7 Full form of XSS Xetention software sy Cross -site sripting
8 Full form of URL Uniform Resource LocaUniform Restored Loca
9 _________ is the most common risk management strategRisk Acceptance Risk Avoidance
10 A fake website which is designed to look almost like the Wabbits Backdoor
e: SYBMS
Second Year and III
TBM
E-Security system

option 3 option 4 Answer


Humans Middle 4
Non-Phyiscal Threats Security Threats 1
Worms All of the above 4
Virus spyware 1
spayware virus 1
Third Party IntegrationAll of the above 4
Cross site system Cross software system 2
Uniform Resource LocaUniverse Restored loca 1
Risk Limitation Risk Transferance 3
exploit Phishing 4
Programme: SYBM
Class and Semester: Second Y

Unit-4 Chapter: 20- E-Buisness Risk M


Asst Prof. Archana Sanap

Sr.no. Questions option 1


1 Full from of DoS Denial of service attac
2 A _____ attack is an application or device that can read,moniter & capture IP spoofing
3 A______ is a network security system,either hardware or software base that Fuirwall
4 What are the types of firwall according to NIST? Packet filter
5 Stateful inspection was first introduce in _____ 1993
6 Circuit level gatways are the second generation of _______ architectures. TCP
7 Types of network attack________ IP spoofing
8 The third generation of firewall architechures is called Application Level Gat
9 Firwall do not protect against_________ attack. Phishing
10 _______ controls How particular services are used. Behavior
Programme: SYBMS
s and Semester: Second Year and III
Subject: ITBM
er: 20- E-Buisness Risk Management issues

option 2 option 3 option 4 Answer


Denial of suface attack Denial of service attemptDenial of serface attempt 1
DoS attack Sniffer attack Man in the Middle aatack 3
Traffic Proxy DoS 1
proxy stateful inspection All of the above 4
1994 1998 1999 2
TCP/IP Firewall UDP 3
DoS attack Sniffer attack All of the above 4
Circuit Level Gateway Software Firwall Hardware Firwall 1
Adware Backdoor Virus 3
Service Direction User 1
Programme: SYBMS
Class and Semester: Second Year and III
Subject: ITBM
Unit-4 Chapter: 21- E-Real Time Application in B
Asst Prof. Archana Sanap

Sr.no. Questions option 1 option 2


1 A_____ system is a type of hardware or software that Real Time Real time system
2 ______ are those which must produce the correct respo Real Time Real time system
3 ______ a program for a which the correction of opratiReal Time Real time system
4 Types of real time system: clock base system interactive system
5 Task has to be compeleted in the specified time inter Real Time Real time clock
6 Full from of RTA Real Time application Real Type application
7 Full from of RTC Real time computing Real time computer
8 Threat hunting software and service not include Carbon black cybereason
9 _____ is an American Company founded in 2012 that ma sqrrl carbon black
10 _________is an enterprise technology company headqu sqrrl carbon black
me: SYBMS
r: Second Year and III
BM
l Time Application in Business

option 3 option 4 Answer


Real time program Hard Real time 1
Real time program hard Real time 2
Real time program Hard Real time 3
event base system all of the above 4
interactive system Real time system 2
Real type applicant Real time applicant 1
Real type computing Real type computer 1
sqrrl cyber Threat 4
cybereason ExtraHop Network 1
cybereason ExtraHop Network 4

You might also like