11 Jul 2014

Smu mba ecommerce sample paper set three



Unit 07-1 Mark

4. In the context of data security, the word _________ usually refers to the various threats to data and information security.
Active contents
Correct
Risk
Feedback:Right choice: In the context of data security, the word risk usually refers to the various threats to data and information security.
Eavesdroppers
Flooding
5. Sabotage by ex-employees may include:
Wrong
HTML publishing
Feedback:Not the right choice: HTML publishing is the internet technology used by the intranet.
Should have chosen
Erasing of files
Eavesdroppers
Internal hackers
6. The __________ is basically a network within an organisation, which is similar to the internet and helps in sharing of information, communications and supporting business processes.
Web Browser
Server
Should have chosen
Intranet
Wrong
TCP/IP network protocols
Feedback:Not the right choice: TCP/IP network protocol is the internet technology used by the intranet.
7. The ________ is an extension of an intranet to allow access to customers and users outside the company.
Internet
Data interception
Flooding
Correct
Extranet
Feedback:Right choice: Extranet is an extension of an intranet to allow access to customers and users outside the company.1. The ________ means that a customer is not the person that he or she claims to be.
Wrong
Denial of service attacks
Feedback:Not the right choice: A denial of service attack is utilised by hackers to destroy, shutdown or degrade a computer or a network resource.
SYN flooding
Should have chosen
Customer impersonation
Data theft
2. Which is the piece of software that grabs all of the traffic flowing into and out of a computer attached to a network?
Should have chosen
Sniffer
e-Mail spoofing
Wrong
Social engineering
Feedback:Not the right choice: Social engineering is a method of extracting the information such as passwords, firewall configuration data, network operating system data and so on from a current employee or employer.
SYN flooding
3. Identify the type of threat from the following that is faced by the customers on the internet:
Should have chosen
False or malicious web sites
e-mail
Wrong
Marketing
Feedback:Not the right choice: Marketing is one of the application of internet.
Information gathering

No comments:

Post a Comment