Skip to main content
- In a GUI, the window that is currently in use is called the ________.
- top
- active
- biggest
- framed
- DOS and some versions of UNIX are examples of ________ interfaces.
- Old-fashioned
- GUI
- Command-line
- Parallel
- Select the Operating System that may be used in computerized heart-monitor
- Multi-user/multitasking
- Real-time
- Single-user/single tasking
- Single-user-multitasking
- Which of the following is not a type utility software
- Customization tools
- Disk and file management
- Tabbed dialog box
- Internet security
- The operating system is the intermediary between programs and ________.
- User interface
- Utilities
- Ether
- Hardware
- An operating system keeps track of which programs have access to which hardware devices and uses ________ to help the CPU coordinate processes
- Interrupt requests (IRQs)
- Disk drives
- Multitasking
- User
- UNIX and Windows NT are examples of :
- Single User OS
- Multi-user OS
- Multi-user Multi-tasking OS
- Single-user Multi-tasking OS
- Windows NT was released as a -------bit operating system in 1993
- 32
- 8
- 16
- 64
- The feature which enables the computer system to recognize new device connected to it by users is called:
- Device identification
- Plug and Play
- Connect and Play
- Auto-configuration
- In a _______________ network, all devices are connected to a device called a hub and communicate through it
- Bus
- Ring
- Mesh
- Star
- Which of the following may be present in a 2-tier network?
- Web server
- Application server
- Both a and b
- None of these
- A(n) ___________ is an agreed upon format for transferring data between two devices.
- transmission
- protocol
- intranet
- extranet
- A central computer with a large storage device and other resources which can be shared by all users is called a ________ server.
- Printer
- Application
- Network
- Resource
- A __________ is a processing location which can be a PC or some other device such as a networked printer
- Node
- Hub
- Switch
- Bridge
- Which of the following network topologies is the LEAST used
- Star
- Bus
- Ring
- Mesh
- In the Internet environment, packets are called ____________.
- Payload
- Datagrams
- Messages
- Headers
- In which of the following network topologies, data will never fail to be delivered?
- Mesh
- Ring
- Star
- Tree
- ___________ broadcasts the packets it receives to all nodes attached to its ports.
- Router
- Hub
- Switch
- Modem
- With Cat5 cable, data can move at a speed of up to ________ Mbps.
- 500
- 1000
- 100
- 256
- ___________ is a node on a network that serves as an entrance to another network.
- gateway
- router
- DHCP
- Server
- With reference to the Peer-to-Peer networks, which of the following statements is TRUE?
- Peer-to-Peer networks will not have a server
- All Peer-to-Peer networks will have a server
- Some peer-to-peer networks have file servers; some do not
- Peer-to-Peer network is formed among servers only
- ___________ layer understands IP addresses and is responsible for routing, forwarding and error handling.
- Network
- Transport
- Session
- Data Link
- Common communication services such as compression, encryption are carried out by ___________ layer.
- Physical
- Transport
- Network
- Presentation
- VoIP systems transmit the sound of your voice __________________.
- over the traditional phone wires
- over a computer network using Internet Protocol
- over a cellular mobile network
- over a local area network
- The abbreviation bps stands for:
- bytes per second
- bits per second
- bandwidth per second
- baudrate per second
- Which of the following signals will have only two values?
- Digital signals
- voice signals
- Analog signals
- Electrical signals
- The expression Mbps stands for _______.
- thousand bits per second
- Megabits per second
- Gigabits per second
- Microbits per second
- The basic rate ISDN service provides ______________.
- one 256 Kbps data channel and one 64 Kbps error-checking channel
- two 64 Kbps data channels and one 19 Kbps error-checking channel
- 13 communication channels
- Two 13 communication channels
- A MODEM is used to covert:
- Analog signals into digital signals and vice-versa
- Analog signals into light signals and vice-versa
- Digital signals into light signals and vice-versa
- Electrical signals into voice signals and vice-versa
- A MODEM is a device used to provide ___________ in a data transmission.
- Signal strength
- clarity
- compatibility
- Redundancy
- Data communications usually take place over media that are specifically set up for the network and are know as ________ media.
- Committed
- Designated
- Constant
- Dedicated
- If file is sent from your computer to another person’s computer, you are ----------the file.
- Downloading
- Sharing
- Uploading
- Transferring
- Which of the following is used to provide Broadband service?
- Digital Subscriber Line
- Digital Service Line
- Telephone Subscriber Line
- Analog Service Line
- Many homes and small businesses connect to the Internet by using a telephone line and this.
- A 5.6 Kbps modem
- A 56 Kbps modem
- A 560 Kbps modem
- A 5,600 Kbps modem
- A broadband connection may provide a home computer user with data transfer speeds that are ___________ times faster than a standard 56K modem link’
- 1000
- 10
- 100
- 56
- Sockets and Winsock are examples of ________ type of software.
- VCR
- DSL
- IPX
- API
- Which of the following is network that extends over a large geographical area.
- WLAN
- WAN
- WEP
- WSAT
- Wi-Fi Protected Access was created as a replacement for this encryption standard.
- WEP
- WPA
- WLAN
- WWAN
- ISDN stands for _________________Services Digital Network
- Integrated
- Internet
- Intranet
- Incorporated
- __________________is a generic name given for the station that is installed, when an organization contracts with an ISP
- SATV
- TASV
- VSAT
- ASTV
- In a word processor you must select or block the complete text for formatting ____________.
- Font
- Paragraph
- Page
- Margins
- In a worksheet, ____________ is the intersection of row and column.
- grid
- pixel
- cell
- table
- A __________ is designed to keep track of many different kinds of contact information, for many different people
- Workbook
- Program
- PIM
- Stand-alone program
- Spreadsheets work with four basic kinds of data—labels,numbers,date and ____________.
- Formula
- Logical
- Boolean
- Image
- Any software which is available to the public for free for a limited period is known as a(n) __________.
- Openware
- Free ware
- Shareware
- Complimentary-ware
- In MS Word, a line break can be created by pressing the _____________ key(s).
- Enter
- Shift+Enter
- Ctrl+Enter
- Alt
- A ______________ image consists of pixels assigned the required colours.
- Raster
- Large
- Vector
- Complex
- Adobe Photoshop, by default, saves images in its proprietary ________ format.
- PDF
- JPEG
- PSD
- PNG
- It is easy to move a graphic image from one position to another on the screen in ________ format(s).
- Vector
- Bitmapped
- Both vector and bitmapped
- Neither vector nor bitmapped
- Which of the following statements is TRUE?
- Both Draw programs and Paint programs provide flexibility
- Draw programs provide flexibility and Paint programs do not.
- Paint programs provide flexibility and Draw programs do not.
- Both Draw programs and Paint programs do not provide flexibility.
- _______________ is a common file format that exists for vector graphics
- IEGS
- IGES
- ISGE
- EGIS
- RAID storage systems use
- One huge disk drive of large capacity
- Two or more disks simultaneously
- A maximum of two disks simultaneously
- Very low storage capacity
- SMP and MPP are processes used in ______________.
- Power plants
- Wide Area Networks
- Data Warehouses
- Data Downloading
- Which of the following RAID systems is reliable, fast as well as cost effective?
- Striping with parity
- Mirroring
- Striping
- Striping with parity
- In which of the following field types, field sizes is not specified?
- Memo, Counter and Date/Time
- Memo, Number, DateTime
- Memo and Date/Time
- Text, Memo, Date/Time
- Binary fields store ______________ values.
- Yes or No
- 0 and 1
- Numbers
- large objects
- Which of the following statements is FALSE regarding Foreign Key?
- Foreign key fields cannot contain duplicate values
- Foreign key fields can contain duplicate values
- Foreign key in one table is primary key of another table
- Foreign key ensures referential integrity
- Which of the following query types will produce a Cartesian product?
- Left join
- Right join
- Equi-join
- None of these
- Which of the following RDBMS is an “open source” software?
- MySQL
- MS SQL
- DB2
- Oracle
- An efficient way to handle heavy user traffic is to use:
- Super database
- more processors
- Data mining
- Disconnected datasets
- Which of the Normal forms of RDBMS allows attributes that do not depend on the primary key?
- 1NF
- 2NF
- 3NF
- None of these
- ________________ databases are two-dimensional tables of fields and records that do not form relationships with other tables.
- Relational
- Hierarchical
- Flat-file
- Structured file
- Which of the following RAID level uses striping with parity?
- Level 0
- Level 1
- Level 5
- All these levels
- Which of the following hacking techniques do not involve use of any technology?
- Spoofing
- Social Engineering
- Denial of Service
- Distributed Denial of Service
- Records such as marriage records are:
- Private records
- Confidential records
- Public records
- Screened records
- Which of the following appliances generate magnetic fields? I) Loudspeakers II) CRT monitors III) Flourescent light fixtures
- I and II only
- I and III only
- I, II and III
- II and III only
- Which of the following methods of encryption uses the same key for encryption for decryption?
- Symmetric key encryption
- Asymmetric key encryption
- Public key encryption
- None of these
- Data integrity and confidentiality is ensured by using:
- Public key encryption
- Private key encryption
- Combination of both
- Electronic signature
- Which of the following type of cookies has a longer storage life?
- First Party
- Third Party
- Session
- None of these
- Which of the following ensures a sender's authenticity and an e-mail's confidentiality?
- Encrypting the hash of the message with the sender's private key and thereafter encrypting the hash of the message with the receiver's public key
- The sender digitally signing the message and thereafter encrypting the hash of the message with the sender's private key
- Encrypting the hash of the message with the sender's private key and thereafter encrypting the message with the receiver's public key
- Encrypting the message with the sender's private key and encrypting the message hash with the receiver's public key
- Which of the following controls would provide the GREATEST assurance of database integrity?
- Audit log procedures
- Table link/reference checks
- Query/table access time checks
- Rollback and rollforward database features
- An installed Ethernet cable run in an unshielded twisted pair (UTP) network is more than 100 meters long. Which of the following could be caused by the length of the cable?
- Electromagnetic interference (EMI)
- Cross-talk
- Dispersion
- Attenuation
- Which of the following sampling methods is MOST useful when testing for compliance?
- Attribute sampling
- Variable sampling
- Stratified mean per unit
- Difference estimation
- Which of the following is a feature of an intrusion detection system (IDS)?
- Gathering evidence on attack attempts
- Identifying weaknesses in the policy definition
- Blocking access to particular sites on the Internet
- Preventing certain users from accessing specific servers
- In an online banking application, which of the following would BEST protect against identity theft?
- Encryption of personal password
- Restricting the user to a specific terminal
- Two-factor authentication
- Periodic review of access logs
- When a new system is to be implemented within a short time frame, it is MOST important to:
- finish writing user manuals.
- perform user acceptance testing.
- add last-minute enhancements to functionalities.
- ensure that the code has been documented and reviewed
- Which of the following methods of suppressing a fire in a data center is the MOST effective and environmentally friendly?
- Halon gas
- Wet-pipe sprinklers
- Dry-pipe sprinklers
- Carbon dioxide gas
- Which of the following is an example of a passive attack initiated through the Internet?
- Traffic analysis
- Man-in-the Middle
- Denial of service
- e-mail spoofing
- The database administrator (DBA) suggests that DB efficiency can be improved by denormalizing some tables. This would result in:
- loss of confidentiality
- increased redundancy
- unauthorized accesses
- application malfunctions
- Which of the following is the PRIMARY advantage of using computer forensic software for investigations?
- The preservation of the chain of custody for electronic evidence
- Time and cost savings
- Efficiency and effectiveness
- Ability to search for violations of intellectual property rights
- A programmer maliciously modified a production program to change data and then restored the original code. Which of the following would MOST effectively detect the malicious activity?
- Comparing source code
- Reviewing system log files
- Comparing object code
- Reviewing executable and source code integrity
- After installing a network, an organization installed a vulnerability assessment tool or security scanner to identify possible weaknesses. Which is the MOST serious risk associated with such tools?
- Differential reporting
- False-positive reporting
- False-negative reporting
- Less-detail reporting
- The FIRST step in managing the risk of a cyberattack is to:
- assess the vulnerability impact.
- evaluate the likelihood of threats.
- identify critical information assets.
- estimate potential damage.
- Which of the following is the MOST effective method for dealing with the spreading of a network worm that exploits vulnerability in a protocol?
- Install the vendor's security fix for the vulnerability
- Block the protocol traffic in the perimeter firewall
- Block the protocol traffic between internal network segments
- Stop the service until an appropriate security fix is installed
- Which of the following network components is PRIMARILY set up to serve as a security measure by preventing unauthorized traffic between different segments of the network?:
- Firewalls
- Routers
- Layer 2 switches
- Virtual local area networks (VLANs)
- An IS auditor is performing a network security review of a telecom company that provides Internet connection services to shopping malls for their wireless customers. The company uses Wireless Transport Layer Security (WTLS) and Secure Sockets Layer (SSL) technology for protecting their customer's payment information. The IS auditor should be MOST concerned if a hacker:
- compromises the Wireless Application Protocol (WAP) gateway.
- installs a sniffing program in front of the server.
- steals a customer's PDA.
- listens to the wireless transmission
- Which of the following BEST reduces the ability of one device to capture the packets that are meant for another device?
- Filters
- Switches
- Routers
- Firewalls
- In a client-server system, which of the following control techniques is used to inspect activity from knownor unknown users?
- Diskless workstations
- Data encryption techniques
- Network monitoring devices
- Authentication systems
- An installed Ethernet cable run in an unshielded twisted pair (UTP) network is more than 100 meters long. Which of the following could be caused by the length of the cable
- Electromagnetic interference (EMI)
- Crosstalk
- Dispersion
- Attenuation
- Which of the following would be considered an essential feature of a network management system?
- A graphical interface to map the network topology
- Capacity to interact with the Internet to solve the problems
- Connectivity to a help desk for advice on difficult issues
- An export facility for piping data to spreadsheets
- The MOST likely error to occur when-implementing afifewall:
- incorrectly configuring the access lists.
- compromising the passwords due to social engineering.
- connecting a modem to the computers in the network.
- inadequately protecting the network and server from virus attacks.
- When reviewing the implementation of a local area network (LAN), an IS auditor should FIRST review the:
- node list.
- acceptance test report.
- network diagram.
- users list
- The BEST way to minimize the risk of communication failures in an e-commerce environment would be to use:
- compression software to minimize transmission duration.
- functional or message acknowledgments.
- a packet-filtering firewall to reroute messages.
- leased asynchronous transfer mode lines
- IT best practices for the availability and continuity of IT services should:
- minimize costs associated with disaster-resilient components.
- provide for sufficient capacity to meet the agreed upon demands of the business.
- provide reasonable assurance that agreed upon obligations to customers can be met.
- produce timely performance metric reports
- During maintenance of a relational database, several values of the foreign key in a transaction table of a relational database have been corrupted. The consequence is that:
- the detail of involved transactions may no longer be associated with master data, causing errors when these transactions are processed.
- there is no way of reconstructing the lost information, except by deleting the dangling tuples and reentering the transactions.
- the database will immediately stop execution and lose more information.
- the database will no longer accept input data.
- In a relational database with referential integrity, the use of which of the following keys would prevent deletion of a row from a customer table as long as the customer number of that row is stored with live orders on the orders table?
- Foreign key
- Primary key
- Secondary key
- Public key
- An IS auditor examining the configuration of an operating system to verify the controls should review the:
- transaction logs.
- authorization tables.
- parameter settings.
- routing tables.
- The computer security incident response team (CSIRT) of an organization disseminates detailed descriptions of recent threats. An IS auditor's GREATEST concern should be that the users might:
- use this information to launch attacks.
- forward the security alert.
- implement individual solutions.
- fail to understand the threat.
- Accountability for the maintenance of appropriate security measures over information assets resides with the:
- security administrator.
- systems administrator.
- data and systems owners.
- systems operations group
- To determine who has been given permission to use a particular system resource, an IS auditor should review:
- activity lists.
- access control lists.
- logon ID lists.
- password lists.
Nice blog has been shared by you. it will be really helpful to many peoples who are all working under the technology.thank you for sharing this blog.
ReplyDeleteElectronic Signature Software
Interesting, great job and a debt of gratitude is in order for sharing such a decent blog
ReplyDeletefirewall services
I read your post and got it quite informative. I couldn't find any knowledge on this matter prior to. I would like to thanks for sharing this article here.cpu render
ReplyDeleteAfter a long time, I read a very beautiful and very important article that I enjoyed reading. I have found that this article has many important points, I sincerely thank the admin of this website for sharing it. Best it support companies for small business service provider.
ReplyDeleteThanks for giving a very interesting blog. Very nice to see your blog.
ReplyDeleteIOS app development company in chennai
Mobile app development company in chennai
SMO Services in chennai
ReplyDeleteIt’s great to come across a blog every once in a while that isn’t the same out of date rehashed material. Fantastic read. Best Upc Barcodes For Sale service provider
معلومات رائعة ، لقد قدمت لنا بيانات مهمة وضرورية للغاية. انها قيمة ومفيدة للجميع. استمر في النشر دائمًا. أنا ممتن جدا لك. شكرا مرة أخرى لتقاسمها. الرجاء زيارة موقعنا سكاي سوفت
ReplyDeleteA firm with permission (or which ought to have permission ) to carry on mortgage mediation activity is called Mortgage intermediary.
ReplyDeleteKeep sharing this kind of articles, Thank you. Call Packages Telenor
ReplyDeleteShare great information about your blog , Blog really helpful for us . NEC Brisbane
ReplyDeleteVery informative and easy to understand. Find out more here: Digital Marketing Agency in Chennai
ReplyDelete