Thursday, March 7, 2013

I.T. OFFICER QUIZ

1.  This is a set of related programs , usually located at network gateway server, that network gateway server, that protects the resources of a private network from other networks:
(a)    Firewall
(b)    Root kit
(c)    Sandbox
(d)    Password Cracker
(e)    None of these.
2.      This is class of programs that searches your hard drive and floppy disks for any known or potential viruses:
(a)    Instrusion Detection
(b)    Firewall
(c)    Security Identifier
(d)    Antivirus Software
(e)    Antigen
3.      A passive threat to computer security is___________
(a)    Malicious Intent
(b)    Sabotage
(c)    Accidential Errors
(d)    Espionage Agents
(e)    None of these
4.      _______allows wireless mobile devices to access the Internet and its services such as the Web and Email.
(a)    TCP/IP
(b)    Ethernet
(c)    WAP
(d)    Token ring
(e)    None of these
5.      The _______ component is used by the data analyst to create the queries that access the database.
(a)    Data extraction
(b)    End user-query tool
(c)    End user-presentation tool
(d)    Data store
(e)    None of these
6.      A polymorphic virus ______
(a)    Modifies its program code each time it attaches itself to another program or file.
(b)    Is a malicious logic program that copies itself repeatedly in memory or on a disk drive until no memory of disk space remains.
(c)    A malicious logic program that hides within or looks like a legitimate program.
(d)    Infects a program file, but still reports the size and creation date of the original uninfected program.
(e)    None of these
7.      The altering of data so that it is not usable unless the changes are done is______
(a)    Biometerics
(b)    Compression
(c)    Encryption
(d)    Ergonomics
(e)    None of these
8.      A communications processor that connects dissimilar networks by providing the translation from one set of protocol to another is.
(a)    Bridge
(b)    Gateway
(c)    Router
(d)    Modem
(e)    All of the above
9.      RSA is _________
(a)    Symmetric Cryptosystem
(b)    Asymmetric Cryptosystem
(c)    Block Cypher
(d)    Digital Signature
(e)    None of these
10.   Which of the following statements is not true about two tier client server database architecture?
(a)    SQL statements are processed on tier server
(b)    SQL statements may be processed on some of the clients
(c)    Business logic is mostly processed on clients
(d)    Business logic may be processed on the server
(e)    None of these
11.   Graphical diagrams used to represent different multiple perspectives of system include______
(a)    Use-case, class and state diagrams
(b)     State ,interaction, derivative diagrams
(c)    Interaction, relationship, and class diagrams
(d)    Deployment, relationship, and use-case diagrams
(e)    None of these

ANSWER:
1.
(a)
7.
( c)
2.
(d)
8.
(b)
3.
(a)
9.
(b)
4.
(c)
10.
(c)
5.
(b)
11.
(a)
6.
(a)



No comments:

Post a Comment