We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10
CS-625 Professional Practices
Update MCQ’S Final Term
By Vu Topper RM Rizwan Manzoor @vutopperrm Vu Topper RM
d cc
For More Help Contact What’s app 03224021365
Question No:1 (Marks:1) Vu-Topper RM Information Security sometimes also referred to as _______. A. InfoSe B. InfoSec C. InfSec D. InfoTec
Question No:2 (Marks:1) Vu-Topper RM
Regulation is concerned with ______________________. A. personal information B. retention C. defamation D. rules and directions
Question No:3 (Marks:1) Vu-Topper RM
Intentionally entering false data or amending data in the computer is called _______________. A. Program fraud B. Hacking C. Input fraud D. Eavesdropping
Question No:4 (Marks:1) Vu-Topper RM
Product liability and the Consumer Protection Act ensures that ________________________________________. A. the product is well designed B. the product meets some standard C. the product is licensed D. the manufacturer is liable for damage in product
For More Help Contact What’s app 03224021365
Question No:5 (Marks:1) Vu-Topper RM Defamation is the ___________ of information. A. integrity B. correctness C. store D. leak
Question No:6 (Marks:1) Vu-Topper RM
__________________ can be defined as an agreement or contract between two companies where the owner of one company let the other company use its property under pre-decided specific parameters. A. Licensing B. Certification C. Standards D. Negligence
Question No:7 (Marks:1) Vu-Topper RM
If the contracts are too harsh or unfair causing any issue between parties to be unresolved, it is the responsibility of ________ to contemplate according to the rules. A. Manager B. Contract hire C. Contract laws D. Consultancy hire
Question No:8 (Marks:1) Vu-Topper RM
One of the common factors in failure of system safety is __________. A. Environment B. Design C. People D. Hardware
For More Help Contact What’s app 03224021365
Question No:9 (Marks:1) Vu-Topper RM The demonstrated ability to use information technology is known as _________________. A. Licensing B. Competence C. Certification D. Negligence
Question No:10 (Marks:1) Vu-Topper RM
Computer Misuse Act is an Act of the Parliament of the _________________________. A. United Kingdom B. Germany C. United States of America D. France
Question No:11 (Marks:1) Vu-Topper RM
The CIA principle is: A. Confidential, Integrity, Availability B. Confidential, Integrity, Accessibility C. Confidence, Integral, Accessibility D. Confidence, Integral, Availability
Question No:12 (Marks:1) Vu-Topper RM
One of the main concern associated with a product in mission critical applications is ______________. A. End users B. Safety and Reliability C. Launch time D. Scalibilty
For More Help Contact What’s app 03224021365
Question No:13 (Marks:1) Vu-Topper RM Hacking of a site is called __________________. A. website hacking B. computer hacking C. password hacking D. net hacking
Question No:14 (Marks:1) Vu-Topper RM
Consultancy projects are usually undertaken for a fixed price but the form of contract is very much _________. A. Ambiguous B. Complex C. Simpler D. Difficult
Question No:15 (Marks:1) Vu-Topper RM
In which contract the supplier agrees to provide the services of one or more staff to work for the client? A. Time and Materials B. Consultancy Contracts C. Contract Hire D. Fixed Price
Question No:16 (Marks:1) Vu-Topper RM
____________________ is defined as "theft" of property following and directly related to the use of any computer to fraudulently cause a transfer of that property from inside the premises to a person outside those premises. A. Program Fraud B. Input Fraud
For More Help Contact What’s app 03224021365
C. Output Fruad D. Computer Fraud
Question No:17 (Marks:1) Vu-Topper RM
If copyright is to remain with the software house and the client is merely given permission to use the software, it is known as: A. Assignment B. Sale C. License D. Terms and conditions
Question No:18 (Marks:1) Vu-Topper RM
Which type of software service contracts are typically used to assess some aspect of an organization and to make proposals for improvements? A. Fixed price B. Time and materials C. Consultancy D. Contract hire
Question No:19 (Marks:1) Vu-Topper RM
What type of contracts are used to assess some aspect of an organization and to make proposals for improvements? A. Consultancy B. Fixed Price C. Time and materials D. Contract Hire
For More Help Contact What’s app 03224021365
Question No:20 (Marks:1) Vu-Topper RM After acceptance of the product the warranty period is of how many days? A. 30 B. 90 C. 120 D. 6
Question No:21 (Marks:1) Vu-Topper RM
Modification of existing features of an application is called __________________. A. computer hacking B. software hacking C. net hacking D. password hacking
Question No:22 (Marks:1) Vu-Topper RM
Brute force attack tries password based on ______________. A. all possible letter combinations B. encrypted text C. hash tokens D. predefined password
Question No:23 (Marks:1) Vu-Topper RM
The term negligence in software liability refers to ________________. A. Lack of care B. System safety C. Ignore users D. Licensing
For More Help Contact What’s app 03224021365
Question No:24 (Marks:1) Vu-Topper RM _______________ fraud involves the victim being contacted, told that there is a problem with their computer, and that for a fee this issue can be resolved. A. Input Fraud B. Output Fruad C. Program Fraud D. Computer Fraud
Question No:25 (Marks:1) Vu-Topper RM
Software suppliers try to use what are known as _________. A. Hire Contract B. Standard Form Contract C. Consultancy D. Standard Form
Question No:26 (Marks:1) Vu-Topper RM
There are ______ types of contractual agreement which are widely used in connection with the provision of software services: A. One B. Four C. Two D. Three
Question No:27 (Marks:1) Vu-Topper RM
Listening to the private conversation of other people without their consent is called _______________. A. Authorization B. Authentication C. Data Analysis
For More Help Contact What’s app 03224021365
D. Eavesdropping
Question No:28 (Marks:1) Vu-Topper RM
Accessing a computer without the authorization of the owner is called _______________. A. Eavesdropping B. Hacking C. Input fraud D. Output fraud
Question No:29 (Marks:1) Vu-Topper RM
Which of the following comes at the top level in Information Security Organizational Structure. A. CIO B. Security director C. Board of directors/trustess D. President
Question No:30 (Marks:1) Vu-Topper RM
If the ownership of copyright passes to the client, it is known as: Select the correct option A. Terms and Condition B. Assignment C. Sale D. Licsence
Question No:31 (Marks:1) Vu-Topper RM
Privacy is also called _________________. A. privateness
For More Help Contact What’s app 03224021365
B. regulation C. retention D. converse
Visit My YouTube Channel
For Subjective and More Important Files Channel Name = #VuTopperRM