Professional Documents
Culture Documents
Question: 2
(B) HARLIE
(C) PARAM
(D) Creeper
Question: 3
(B) Joystick
(C) Trackball
Question: 4
(B) 1986
(C) 1988
(D) 1999
Question: 5
Ans: C
Question: 6
Ans: B
Threat monitoring
Question: 1
Which one of the following is a key function of firewall?
(A) Copying
(B) Moving
(C) Deleting
(D) Monitoring
Question: 2
(A) Assembling
(B) Interlocking
(C) Pairing
(D) Networking
Question: 3
(B) Phishing
(C) Malware
(D) Virus
Question: 4
(A) Phishing
(B) Adware
(C) Firewall
(D) Spam
Question: 5
(A) Hacker
(B) Analyst
(C) Spammer
(D) Programmer
Question: 6
Question: 7
Question: 1
(A) Virus
(B) Disease
(C) Hurricane
(D) Torpedo
Question: 2
(B) Portals
(C) Spam
(D) Viruses
Question: 3
(A) Spamming
(B) Buging
(C) Spoofing
(D) Phishing
Question: 4
Hackers often gain entry to a network be pretending to be at a
legitimate computer
(A) IP spoofing
(B) Forging
(C) Spoofing
Question: 5
Some viruses have delayed payload, which is sometimes called a
(A) Bomb
(B) Anti-virus
(C) Time
Question: Trojan-Horse programs
(a) are legitimate programs that allow unauthorized access
(b) are hacker programs that do not show up on the system
(c) really do not usually work
(d) are usually immediately discovered
Question: What is a backup?
(a) Restoring the information backup
(b) An exact copy of a system’s information
(c) The ability to get a system up and running in the event of a system crash
or failure
(d) All of these
Question: A computer checks the _____ of user names and passwords for a
match before granting access.
(a) Website
(b) Network
(c) Backup file
(d) Data base
Question: If you receive an e-mail from someone you don’t know, what
should you do ?
(a) Forward it to the police immediately
(b) Delete it without opening it
(c) Open it and respond to them saying you don’t know them
(d) Reply and ask them for their personal information
Question: __ are electronic files that are used to uniquely identify people
and resources over the internet
(a) Digital signature
(b) Digital certificate
(c) Encryption recourse
(d) None
Biometrics
Question 1
________________ is a branch of information technology that aims towards establishing
one’s identity based on personal traits.
A. Control Systems
B. Biometrics
C. Convex Optimization
D. Pulse
Question 2
Biometrics is a technology used to ___________ an individual’s physical and behavioral
characteristics.
A. identify
B. analyze
C. measure
D. All of the above
Question 3
The idea of retinal identification was conceived by Dr. Carleton Simon and Dr. Isadore
Goldstein in?
A. 1907
B. 1917
C. 1935
D. 1951
Question 4
In 2001, Biometrics Automated Toolset (BAT) was introduced in Kosovo, which provided a
concrete identification means.
A. TRUE
B. FALSE
C. Can be true or false
D. Can not say
Question 5
Biometrics is used for ____________ a person.
A. authenticating
B. authorizing
C. authenticating and authorizing
D. None of the above
Question 6
This uniqueness of a person is then used by the biometric systems to ?
A. Identify and verify a person
B. Authenticate a person to give appropriate rights of system operations
C. Keep the system safe from unethical handling
D. All of the above
Question 7
Which process tries to find out answer of question, Are you the same who you are
claiming to be? or Do I know you?
A. Verification
B. Authentication
C. Authorization
D. Security
Question 8
___________ is a digital reference of the distinct characteristics that are extracted from a
biometric sample.
A. Candidate/Subject
B. Enrollment
C. Biometric Template
D. FAR
Question 9
FAR stands for?
A. False Authentication Rate
B. False Acceptance Rate
C. False Authorization Rate
D. False Authorization Risk
Question 10
A biometric system providing low FAR ensures high security.
A. Yes
B. No
C. Can be yes or no
D. Can not say