Professional Documents
Culture Documents
30. Which of the following risk is the failure of a purchased component to perform as
expected?
a) Product risk
b) Project risk
c) Business risk
d) Programming risk
31. Which of the following term is best defined by the statement: “There will be a change of
organizational management with different priorities.”?
a) Staff turnover
b) Technology change
c) Management change
d) Product competition
A. authenticity
B. integrity
C. Non-repudiation
D. All of the above
39. _____________ is a process which verifies the identity of a user who wants to access the
system.
A. Authentication
B. Non-repudiation
C. Integrity
D. None of the above
A. 2
B. 3
C. 4
D. 5
41. Which algorithm algorithm provides the private key and its corresponding public key?
A. Approval Signatures
B. Non-Certified Signatures
C. Visible Digital Signature
D. Invisible Digital Signature
A. error
B. fault
C. flaw
D. All of the above
A. Exception
B. Bugs handling
C. Debugging
D. Error handling
A. Wrong coding
B. Missing coding
C. Extra coding
D. All of the above
46. A _________ is a software bug that attackers can take advantage to gain unauthorized
access in a system.
A. System error
B. Bugged system
C. Security bug
D. System virus
47. What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?
a) Application
b) Host to host
c) Internet
d) Network Access
49. In wireless LAN, there are many hidden stations so that __________ cannot be
detected.
a) Frames
b) Collision
c) Signal
d) Data