This document contains questions and multiple choice options about real-time systems and applications, e-business risk management issues, and e-security systems. It is a study guide for a class on IT business management. The questions cover topics such as types of real-time systems, definitions of common IT and security terms, examples of security threats and mitigation strategies, and names of cybersecurity software companies.
This document contains questions and multiple choice options about real-time systems and applications, e-business risk management issues, and e-security systems. It is a study guide for a class on IT business management. The questions cover topics such as types of real-time systems, definitions of common IT and security terms, examples of security threats and mitigation strategies, and names of cybersecurity software companies.
This document contains questions and multiple choice options about real-time systems and applications, e-business risk management issues, and e-security systems. It is a study guide for a class on IT business management. The questions cover topics such as types of real-time systems, definitions of common IT and security terms, examples of security threats and mitigation strategies, and names of cybersecurity software companies.
Subject: ITBM Unit-4 Chapter: 19- E-Security system Asst Prof. Archana Sanap
Sr.no. Questions option 1 option 2
1 To protect computer system from the list not mentioned Internal p External 2 The non-physical threats are also known as _______ Logical Threats Physical Threats 3 The following list is the common types of non-physical thVirus Trojans 4 __________ one of the most harmless where it programm Worms Trojans 5 _________ something that keeps a record of every keyst Key Loggers Adwary 6 Website get hacking and issues therein: Access control Softwre vernabilites 7 Full form of XSS Xetention software sy Cross -site sripting 8 Full form of URL Uniform Resource LocaUniform Restored Loca 9 _________ is the most common risk management strategRisk Acceptance Risk Avoidance 10 A fake website which is designed to look almost like the Wabbits Backdoor e: SYBMS Second Year and III TBM E-Security system
option 3 option 4 Answer
Humans Middle 4 Non-Phyiscal Threats Security Threats 1 Worms All of the above 4 Virus spyware 1 spayware virus 1 Third Party IntegrationAll of the above 4 Cross site system Cross software system 2 Uniform Resource LocaUniverse Restored loca 1 Risk Limitation Risk Transferance 3 exploit Phishing 4 Programme: SYBM Class and Semester: Second Y
Unit-4 Chapter: 20- E-Buisness Risk M
Asst Prof. Archana Sanap
Sr.no. Questions option 1
1 Full from of DoS Denial of service attac 2 A _____ attack is an application or device that can read,moniter & capture IP spoofing 3 A______ is a network security system,either hardware or software base that Fuirwall 4 What are the types of firwall according to NIST? Packet filter 5 Stateful inspection was first introduce in _____ 1993 6 Circuit level gatways are the second generation of _______ architectures. TCP 7 Types of network attack________ IP spoofing 8 The third generation of firewall architechures is called Application Level Gat 9 Firwall do not protect against_________ attack. Phishing 10 _______ controls How particular services are used. Behavior Programme: SYBMS s and Semester: Second Year and III Subject: ITBM er: 20- E-Buisness Risk Management issues
option 2 option 3 option 4 Answer
Denial of suface attack Denial of service attemptDenial of serface attempt 1 DoS attack Sniffer attack Man in the Middle aatack 3 Traffic Proxy DoS 1 proxy stateful inspection All of the above 4 1994 1998 1999 2 TCP/IP Firewall UDP 3 DoS attack Sniffer attack All of the above 4 Circuit Level Gateway Software Firwall Hardware Firwall 1 Adware Backdoor Virus 3 Service Direction User 1 Programme: SYBMS Class and Semester: Second Year and III Subject: ITBM Unit-4 Chapter: 21- E-Real Time Application in B Asst Prof. Archana Sanap
Sr.no. Questions option 1 option 2
1 A_____ system is a type of hardware or software that Real Time Real time system 2 ______ are those which must produce the correct respo Real Time Real time system 3 ______ a program for a which the correction of opratiReal Time Real time system 4 Types of real time system: clock base system interactive system 5 Task has to be compeleted in the specified time inter Real Time Real time clock 6 Full from of RTA Real Time application Real Type application 7 Full from of RTC Real time computing Real time computer 8 Threat hunting software and service not include Carbon black cybereason 9 _____ is an American Company founded in 2012 that ma sqrrl carbon black 10 _________is an enterprise technology company headqu sqrrl carbon black me: SYBMS r: Second Year and III BM l Time Application in Business
option 3 option 4 Answer
Real time program Hard Real time 1 Real time program hard Real time 2 Real time program Hard Real time 3 event base system all of the above 4 interactive system Real time system 2 Real type applicant Real time applicant 1 Real type computing Real type computer 1 sqrrl cyber Threat 4 cybereason ExtraHop Network 1 cybereason ExtraHop Network 4
Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems