Significant step in implementing a security strategy


Question 1) EDI stands for:

A. Electronic data information
B. Electronic data intercommunication
C. Electronic data interchange
D. Electronic date interchange

Question 2) The production of high quality publications by publishers is best made using:

A. Word-Processor
B. A DTP software
C. An Expert System
D. A 4GL

Question 3) A _____ scanner is a scanner that is moved by hand in order to scan:

A. Sheet feed
B. Hand-held
C. Flatbed
D. None of the above

Question 4) The most significant step in implementing a security strategy is:

A. Computer
B. Security Awareness
C. Cost
D. People

Question 5) A frustrated employee who cracks her manager’s password in order to access confidential data is called as:

A. Internal Threat
B. External Threat
C. Outer Threat
D. None of the above

Question 6) ______ are caused intentionally by users of computer system:

A. Non-Malicious Threat
B. Malicious Threat
C. Both of the above
D. None of the above

Question 7) Malicious threats can also be called as:

A. Firmware
B. Software
C. Maliciousware
D. Malware

Question 8) What are the symptoms in detecting virus infection on your computer:

A. Programs quit working or freeze
B. Documents become inaccessible
C. System seems to run slower than normal
D. All of the above

Question 9) _____ hides within code of another program and wreak havoc to any form of data on the machine:

A. File Infectors
B. Boot Sector Virus
C. Macro Virus
D. Micro Virus

Question 10) Which kind of virus causes damage and compromises security of computer when you open it:

A. Worm
B. Trojan Horse
C. Macro Virus
D. None of the above.

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: Significant step in implementing a security strategy
Reference No:- TGS05829

Expected delivery within 24 Hours