CS205 MID TERM SOLVED MCQs || PAST PAPERS || GROUP-5 || INFORMATION
SECURITY || VuTech
CS205
Information Security
Solved Mid Term Past Papers
______________________________
MCQs
______________________________
Question No: 1
What is the best description of a security standard or framework?
a) Iso27001:2013 (isms)
b) Minimum security baseline
c) Blue print or roadmap for achieving information security objectives
d) A diagram showing architecture of program
Correct Answer:
The correct answer is 'c'.
Question No: 2
_______ assigns quantifiable measures.
a) Standard
b) Policy
c) Guideline
d) Procedure
Correct Answer:
The correct answer is 'a'.
Question No: 3
The key factor related to cloud, mobile, IOT, and social is that ________
.
a) Adoption is low
b) They are mainly being used in developing nations
c) It has further complicated the already difficult task of
achieving a strong security posture
d) These new frontiers are not understood well
Correct Answer:
The correct answer is 'c'.
Question No: 4
_____ is the part of Information Security Awareness.
a) Standard
b) Training
c) Policy
d) Procedure
Correct Answer:
The correct answer is 'b'.
Question No: 5
What are the famous SIEM solutions available in market?
a) CACTI AND ORION
b) SYMANTEC & TRUECRYPT
c) OSSEC, SPLUNK AND Q-RADAR
d) WSUS. SCCM AND SCM
Correct Answer:
The correct answer is 'c'.
Question No: 6
How high availability can be designed in an enterprise IT network?
a) At system level (data center or service)
b) All of given
c) At device level (within single device)
d) At device level (combination of multiple redundant devices)
Correct Answer:
The correct answer is 'b'.
Question No: 7
_____ are important tasks where the information security manager should be
involved.
a) Security webinars
b) Developing sops and guidelines
c) Signing off critical change requests, monitoring the
vulnerability management program, facilitate incident management
process.
d) Threat intelligence
Correct Answer:
The correct answer is 'c'.
Question No: 8
A ___________ is a blueprint or roadmap for achieving Information Security
Objectives
a) Training
b) Standard
c) Process
d) Technology
Correct Answer:
The correct answer is 'b'.
Question No: 9
An attack, in which attacker alters the system resources is called
___________ .
a) Active attack
b) Passive attack
c) Direct attack
d) Indirect attack
Correct Answer:
The correct answer is 'a'.
Question No: 10
"Students are not allowed to bring cell phones in exam hall." is an example
of
a) Security Policy
b) Security control
c) Security mechanism
d) Security service
Correct Answer:
The correct answer is 'b'.
VIDEO