Computer Application and Data Processing-Network (ISS Statistics Paper I (New 2016 MCQ Pattern)): Questions 43 - 47 of 58

Get 1 year subscription: Access detailed explanations (illustrated with images and videos) to 454 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. View Sample Explanation or View Features.

Rs. 300.00 or

Question number: 43

» Computer Application and Data Processing » Network » Computer Security

MCQ▾

Question

Confidentiality in Computer Security refers to:

Choices

Choice (4) Response

a.

Improper alterations in a secure computer system should be detectable and recoverable.

b.

The situation that an unauthorized party has gained access to a service or data.

c.

Information of computer is disclosed only to authorize parties.

d.

Both a. and c. are correct

Question number: 44

» Computer Application and Data Processing » Network » Internet

MCQ▾

Question

An Internet-type application uses following Internet protocol:

Choices

Choice (4) Response

a.

HTTP

b.

FTP

c.

SMTP

d.

All a. , b. and c. are correct

Question number: 45

» Computer Application and Data Processing » Network » Antivirus

MCQ▾

Question

Antivirus software will always detect:

Choices

Choice (4) Response

a.

Macro viruses

b.

Encrypted viruses

c.

Viruses that have been identified by the author of the anti-virus software

d.

Question does not provide sufficient data or is vague

Question number: 46

» Computer Application and Data Processing » Network » Computer Security

MCQ▾

Question

In security threat, the process where communication between two parties has been overheard by someone else is an example of:

Choices

Choice (4) Response

a.

Interception

b.

Modification

c.

Interruption

d.

Fabrication

Question number: 47

» Computer Application and Data Processing » Network » Computer Security

MCQ▾

Question

Which of the following statement is/are correct regarding computer security mechanism?

Choices

Choice (4) Response

a.

Encryption verify the claimed identity of a user.

b.

Authentication transforms data into something an attacker cannot understand.

c.

Authorization is a kind of permission.

d.

Question does not provide sufficient data or is vague

f Page
Sign In