Professional Documents
Culture Documents
a. Spraining
c. SQL injection
b. Phishing
d. Cross Site Scripting (XSS)
d. Wi-Fi attacks
a. C2C
8. Amazon.com is well known for which
b. C2B E-Commerce marketing technique?
c. Virus a. Trojan
a. Daily stuff
d. Reinvention
a. B2B
d. RSA
a. Preservation
d. large retail firms
a. All of these
c. E-commerce increases the net cost
per contact
b. Quick heal
d. E-commerce is a powerful tool for
c. Mcafee
customer relationship building
b. Work factor
b. internet commerce
d. Least privileges
d. electronic data interchange
22. What is called by a combination of
26. Which of the following factor of the
software and information designed to
network gets hugely impacted when the
provide security and information for
number of users exceeds the network's
payment?
limit?
a. pop up ad
a. Security
b. encryption
b. Performance
c. digital wallet
c. Longevity
d. shopping cart
d. Reliability
23. What was the primary source of
27. When there is an excessive amount
financing during the early years of e-
of data flow, which the system cannot
commerce?
handle, which attack takes place?
a. ERP d. DRP
a. Certainty Risk
c. Project Charter
b. Uncertainty risk
d. Risk Management Plan
48. Which Controls that substitute for 52. Risks can be divided into two basic
the loss of primary controls and mitigate types: business risk and pure (or
risk down to an acceptable level? insurable risk). Of the following, which
one(s) fall(s) under business risk?
a. Administrative controls
a. Personnel-related loss
b. Integrity
b. Profit loss
c. Compensating controls
c. Direct property loss a. Study of exposure duration,
frequency, and magnitude
d. Liability Loss
b. Study of pathways and receptors
53. Which job is important one in risk
Management?
c. Study of toxicity values
a. Production team
d. Chemical analysis
a. decreasing; corporation's
c. researching, reviewing, and
acting on
b. increasing; project's
d. identifying, analysing, and
c. decreasing; sponsor's
responding to
b. Encryption
b. Exposure Assessment
c. Security‐auditing software
c. Toxicity Assessment
d. Intrusion‐detection software
d. Chemical Analysis
57. Which of the following is not a
component of risk characterisation?
61. What is the component of TCP/IP
b. Transfer
that provides the Internet's addressing
scheme and is responsible for the actual
c. Avoidance
delivery of packets?
d. Deflection
a. the Network Layer
66. Which is known as Losses arising due
b. TCP to a risk exposure retained or assured?
c. IP a. Risk Sharing
a. Mitigation
d. Qualitative description of b. stay informed as to the project's
uncertainty progress
b. What are the benefits an d/or 74. There are two general categories of
motivation for the attacker? risk areas, internal and external. What
are the examples of external risk areas?
c. Is there an exploit already for this
vulnerability? a. natural disasters, regulatory, and
design
d. Is there sensitive data in risk to be
exposed? b. currency rates, design, and social
impact
71. Which one is not an offline payment
mode?
c. regulatory, project completion,
and taxation
a. Cash before delivery
d. schedule delays, cost overruns,
b. e‐cheque
and changes in technology
a. Quality c. Acceptance
b. Quantity d. Mitigation
a. Analysis
c. Web services
b. Mitigation
d. Interoperability
a. EIP
c. Grey hats
b. ASP
d. Black hats
a. hacking
d. Encryption
a. worm d. cracking
a. Breach
117. Which of the following are
b. Due care
technologies used to gather information
about you online except one?
c. Incident
a. cookies
d. Trademark
a. Merchant d. anonymizers
a. Spoofing
d. Issuer
a. Wireshark
d. security policy
c. e-commerce d. intranet
a. DRP b. Transference
b. Mitigation c. DRP
124. Which service encompasses all 128. What do we call the process of
technologies used to transmit and seeking out and studying practices in
process information on an across a other organizations that one’s own
network? organization desires to duplicate?
d. Interoperability d. Baselining
c. old site
138. What is a separate and fully 142. DRP ranks a given disaster and acts
equipped facility where the company based on its rank. Which one of the
can move immediately after the disaster following is of the highest priority?
and resume business?
a. None of these
a. disaster recovery plan
b. Long term
b. disaster recovery cost curve
c. Mid term
c. hot site
d. Short term
d. cold site
143. Who breaks into other people's
139. Which of the following statements computer systems and steals and
best describes risk? destroys information?
b. Risk monitoring
c. Risk avoidance
d. Priority
a. encryption
b. SAT
c. SET
d. SSL