Phone:+91-88823 09876

amity solved assignment Information Security & Risk

Information Security & Risk

 

 

1.         What are the 4 jobs of an operating system? 

2.         How does the Operating system keep track of the different disk drives?    

3.         What kind of natural hazards are not normally insurable?    

4.         Describe the trends in disaster mangement.  

5.         What is network security and how does it protect you?       

6.         What is the Microsoft Encrypting File System and what are some of its features?  

7.         What is computer Security?   

8.         Discuss the concept of Local Security Policies

 

Case Detail: 

1. There is no case study. Answer the following questions.

 

2. Discuss the key mechanism of Firewall.

 

3. Define the term "Disaster" and describe its classification.

 

1. In computer security............. means that the computer sytem assets can be modified only by authorized parties           

 

Options          

  1. Confidentiality           
  2. Integrity         
  3. Availability    
  4. Authencity

 

2. A computer security................ means that the information in acomputer sytem only can be accessible for reading by authorized parties 

 

Options          

  1. confidentiality
  2. Integrity         
  3. Availibility     
  4. Authencity

 

3. Which of the following is independent malicious program that need not any host programe?    

 

Options          

  1. Trap Doors     
  2. Trojan horse   
  3. virus   
  4. worm

 

4. The .................... is code embedded in some legitimate program that is set to explode when certain conditions are met

 

Options          

  1. Trap doors      
  2. Trojan horse   
  3. Logic bomb    
  4. Virus

 

5. which of the following malicious prog do not replicate authomatically ? 

 

Options          

  1. Trojan Horse  
  2. Virus  
  3. Worm 
  4. Zombie

 

6. ......................Programs can be used to accomplish functions indirectly that an unauthorized user not accomplish directly    

 

Options          

  1. Zombie           
  2. worm  
  3. Trojan horse   
  4. Logic Bomb

 

7. state whether true of falls 1.A worm mails a copy of itself to other system 2.a worm executes a copy of itself on another system      

 

Options          

  1. true, false       
  2. false, true       
  3. true, true         
  4. false, false

 

8. ............ are used in denial of service attacks, typically against targeted web sites

 

Options          

  1. Worm 
  2. Zombie           
  3. Virus  
  4. Trojan horse

 

9. ..................... is a form of virus explicitely designed to hide itself from detection by antivirus software

 

Options          

  1. Stealth Virus  
  2. Polymorphic virus      
  3. Parastic virus  
  4. macro virus

 

10. State whether the following statement is true 1. A macro virus is paltform indepecent 2. Macro viruese infect documents, not executabel portions of code 

 

Options          

  1. 1 only 
  2. 2 only 
  3. both 1 & 2      
  4. none

 

11. The type of auto executing macros, in microsoft word is/are      

 

Options          

  1. auto execute   
  2. auto macro     
  3. command macro         
  4. all of the above

 

12. In.................... the virus places an identical copy of itself into other programs or into certain sytem areas on the disk          

 

Options          

  1. Dormat phase 
  2. Propagation phase      
  3. Triggering Phase        
  4. execution phase          

 

13. In the world of computing, the essential element that controls how computers are used is       

Options          

  1. ethics  
  2. legal laws       
  3. security requiremnts   
  4. business demands

 

14. The guidelines for the morally acceptable use of computers in socitey are         

 

Options          

  1. computer ethics          
  2. privacy
  3. morality          
  4. legal system

 

15. The issues that deal with the collection and use of data about individuals is     

 

Options          

  1. access 
  2. property          
  3. accuracy         
  4. privacy

 

16. The ethical issue concerned with the correctness of data collected is     

 

Options          

  1. access 
  2. property          
  3. Exactness       
  4. Privacy

 

17. The ethical issue that involves who is able to read and use data is          

 

Options          

  1. access 
  2. property          
  3. accuracy         
  4. privacy

 

18. The vast industry  involves the gathering and selling of personal data is

 

Options          

  1. direct marketing         
  2. fund raising    
  3. information reselling  
  4. government agencies

 

 

University:  AMITY Year:  2015
Subject: 
Information Security & Risk
Course: 
MCA