0% found this document useful (0 votes)
2K views10 pages

CS625 Mcqs FinalTerm by Vu Topper RM

Uploaded by

Only Movies
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views10 pages

CS625 Mcqs FinalTerm by Vu Topper RM

Uploaded by

Only Movies
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

CS-625 Professional Practices

Update MCQ’S Final Term


By Vu Topper RM
Rizwan Manzoor
@vutopperrm Vu Topper RM

d
cc

For More Help Contact What’s app 03224021365


Question No:1 (Marks:1) Vu-Topper RM
Information Security sometimes also referred to as _______.
A. InfoSe
B. InfoSec
C. InfSec
D. InfoTec

Question No:2 (Marks:1) Vu-Topper RM


Regulation is concerned with ______________________.
A. personal information
B. retention
C. defamation
D. rules and directions

Question No:3 (Marks:1) Vu-Topper RM


Intentionally entering false data or amending data in the computer is
called _______________.
A. Program fraud
B. Hacking
C. Input fraud
D. Eavesdropping

Question No:4 (Marks:1) Vu-Topper RM


Product liability and the Consumer Protection Act ensures that
________________________________________.
A. the product is well designed
B. the product meets some standard
C. the product is licensed
D. the manufacturer is liable for damage in product

For More Help Contact What’s app 03224021365


Question No:5 (Marks:1) Vu-Topper RM
Defamation is the ___________ of information.
A. integrity
B. correctness
C. store
D. leak

Question No:6 (Marks:1) Vu-Topper RM


__________________ can be defined as an agreement or contract
between two companies where the owner of one company let the other
company use its property under pre-decided specific parameters.
A. Licensing
B. Certification
C. Standards
D. Negligence

Question No:7 (Marks:1) Vu-Topper RM


If the contracts are too harsh or unfair causing any issue between parties
to be unresolved, it is the responsibility of ________ to contemplate
according to the rules.
A. Manager
B. Contract hire
C. Contract laws
D. Consultancy hire

Question No:8 (Marks:1) Vu-Topper RM


One of the common factors in failure of system safety is __________.
A. Environment
B. Design
C. People
D. Hardware

For More Help Contact What’s app 03224021365


Question No:9 (Marks:1) Vu-Topper RM
The demonstrated ability to use information technology is known as
_________________.
A. Licensing
B. Competence
C. Certification
D. Negligence

Question No:10 (Marks:1) Vu-Topper RM


Computer Misuse Act is an Act of the Parliament of the
_________________________.
A. United Kingdom
B. Germany
C. United States of America
D. France

Question No:11 (Marks:1) Vu-Topper RM


The CIA principle is:
A. Confidential, Integrity, Availability
B. Confidential, Integrity, Accessibility
C. Confidence, Integral, Accessibility
D. Confidence, Integral, Availability

Question No:12 (Marks:1) Vu-Topper RM


One of the main concern associated with a product in mission critical
applications is ______________.
A. End users
B. Safety and Reliability
C. Launch time
D. Scalibilty

For More Help Contact What’s app 03224021365


Question No:13 (Marks:1) Vu-Topper RM
Hacking of a site is called __________________.
A. website hacking
B. computer hacking
C. password hacking
D. net hacking

Question No:14 (Marks:1) Vu-Topper RM


Consultancy projects are usually undertaken for a fixed price but the
form of contract is very much _________.
A. Ambiguous
B. Complex
C. Simpler
D. Difficult

Question No:15 (Marks:1) Vu-Topper RM


In which contract the supplier agrees to provide the services of one or
more staff to work for the client?
A. Time and Materials
B. Consultancy Contracts
C. Contract Hire
D. Fixed Price

Question No:16 (Marks:1) Vu-Topper RM


____________________ is defined as "theft" of property following and
directly related to the use of any computer to fraudulently cause a
transfer of that property from inside the premises to a person outside
those premises.
A. Program Fraud
B. Input Fraud

For More Help Contact What’s app 03224021365


C. Output Fruad
D. Computer Fraud

Question No:17 (Marks:1) Vu-Topper RM


If copyright is to remain with the software house and the client is merely
given permission to use the software, it is known as:
A. Assignment
B. Sale
C. License
D. Terms and conditions

Question No:18 (Marks:1) Vu-Topper RM


Which type of software service contracts are typically used to assess
some aspect of an organization and to make proposals for
improvements?
A. Fixed price
B. Time and materials
C. Consultancy
D. Contract hire

Question No:19 (Marks:1) Vu-Topper RM


What type of contracts are used to assess some aspect of an organization
and to make proposals for improvements?
A. Consultancy
B. Fixed Price
C. Time and materials
D. Contract Hire

For More Help Contact What’s app 03224021365


Question No:20 (Marks:1) Vu-Topper RM
After acceptance of the product the warranty period is of how many
days?
A. 30
B. 90
C. 120
D. 6

Question No:21 (Marks:1) Vu-Topper RM


Modification of existing features of an application is called
__________________.
A. computer hacking
B. software hacking
C. net hacking
D. password hacking

Question No:22 (Marks:1) Vu-Topper RM


Brute force attack tries password based on ______________.
A. all possible letter combinations
B. encrypted text
C. hash tokens
D. predefined password

Question No:23 (Marks:1) Vu-Topper RM


The term negligence in software liability refers to ________________.
A. Lack of care
B. System safety
C. Ignore users
D. Licensing

For More Help Contact What’s app 03224021365


Question No:24 (Marks:1) Vu-Topper RM
_______________ fraud involves the victim being contacted, told that
there is a problem with their computer, and that for a fee this issue can
be resolved.
A. Input Fraud
B. Output Fruad
C. Program Fraud
D. Computer Fraud

Question No:25 (Marks:1) Vu-Topper RM


Software suppliers try to use what are known as _________.
A. Hire Contract
B. Standard Form Contract
C. Consultancy
D. Standard Form

Question No:26 (Marks:1) Vu-Topper RM


There are ______ types of contractual agreement which are widely used
in connection with the provision of software services:
A. One
B. Four
C. Two
D. Three

Question No:27 (Marks:1) Vu-Topper RM


Listening to the private conversation of other people without their
consent is called _______________.
A. Authorization
B. Authentication
C. Data Analysis

For More Help Contact What’s app 03224021365


D. Eavesdropping

Question No:28 (Marks:1) Vu-Topper RM


Accessing a computer without the authorization of the owner is called
_______________.
A. Eavesdropping
B. Hacking
C. Input fraud
D. Output fraud

Question No:29 (Marks:1) Vu-Topper RM


Which of the following comes at the top level in Information Security
Organizational Structure.
A. CIO
B. Security director
C. Board of directors/trustess
D. President

Question No:30 (Marks:1) Vu-Topper RM


If the ownership of copyright passes to the client, it is known as:
Select the correct option
A. Terms and Condition
B. Assignment
C. Sale
D. Licsence

Question No:31 (Marks:1) Vu-Topper RM


Privacy is also called _________________.
A. privateness

For More Help Contact What’s app 03224021365


B. regulation
C. retention
D. converse

Visit My YouTube Channel


For Subjective and More
Important Files
Channel Name = #VuTopperRM

For More Help Contact What’s app 03224021365

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy