Pages

CS205 MID TERM SOLVED MCQs || PAST PAPERS || GROUP-5 || INFORMATION SECURITY || VuTech

CS205 MID TERM SOLVED MCQs || PAST PAPERS || GROUP-5 || INFORMATION SECURITY || VuTech

CS205 MID TERM SOLVED MCQs || PAST PAPERS || GROUP-5 || INFORMATION SECURITY || VuTech

Visit Website For More Solutions
www.vutechofficial.blogspot.com

CS205

Information Security

Solved Mid Term Past Papers

______________________________

MCQs

______________________________


Group-5


Question No: 1

What is the best description of a security standard or framework?


a) Iso27001:2013 (isms)

b) Minimum security baseline

c) Blue print or roadmap for achieving information security objectives

d) A diagram showing architecture of program


Correct Answer:


The correct answer is 'c'.


Question No: 2

_______ assigns quantifiable measures. 


a) Standard

b) Policy

c) Guideline

d) Procedure


Correct Answer:

 

The correct answer is 'a'.


Question No: 3

The key factor related to cloud, mobile, IOT, and social is that ________ .


a) Adoption is low 

b) They are mainly being used in developing nations

c) It has further complicated the already difficult task of achieving a strong security posture

d) These new frontiers are not understood well


Correct Answer: 


The correct answer is 'c'.


Visit Website For More Solutions
www.vutechofficial.blogspot.com


Question No: 4

_____ is the part of Information Security Awareness.


a) Standard

b) Training

c) Policy

d) Procedure


Correct Answer: 


The correct answer is 'b'.


Question No: 5

What are the famous SIEM solutions available in market? 


a) CACTI AND ORION

b) SYMANTEC & TRUECRYPT

c) OSSEC, SPLUNK AND Q-RADAR

d) WSUS. SCCM AND SCM


Correct Answer: 


The correct answer is 'c'.


Visit Website For More Solutions
www.vutechofficial.blogspot.com


Question No: 6

How high availability can be designed in an enterprise IT network?


a) At system level (data center or service)

b) All of given

c) At device level (within single device)

d) At device level (combination of multiple redundant devices)


Correct Answer: 


The correct answer is 'b'.


Question No: 7

_____ are important tasks where the information security manager should be involved.


a) Security webinars

b) Developing sops and guidelines

c) Signing off critical change requests, monitoring the vulnerability management program, facilitate incident management process.

d) Threat intelligence


Correct Answer: 


The correct answer is 'c'.


Question No: 8

A ___________ is a blueprint or roadmap for achieving Information Security Objectives 


a) Training

b) Standard

c) Process

d) Technology


Correct Answer: 


The correct answer is 'b'.


Visit Website For More Solutions
www.vutechofficial.blogspot.com


Question No: 9

An attack, in which attacker alters the system resources is called ___________ .


a) Active attack

b) Passive attack

c) Direct attack

d) Indirect attack


Correct Answer: 


The correct answer is 'a'.


Question No: 10

"Students are not allowed to bring cell phones in exam hall." is an example of 


a) Security Policy

b) Security control

c) Security mechanism

d) Security service


Correct Answer: 


The correct answer is 'b'.


Visit Website For More Solutions
www.vutechofficial.blogspot.com