Assignment 5
Assignment 5
a) Increasing
b) Decreasing
c) Any
d) None of these
4) Which of the following is not a best practice for minimizing security risk
a) Use of encrypted msg
b) Disable unused protocol
c) Use of right software
d) Injection of malware in system
5) Unix is ___________
a) Uniplexed Information and computing service
b) Unique information and computing service
c) User information and computing service
d) Universal information and computing service
6) Most of the wireless vulnerability are in _________
a) 802.09 protocol
b) 802.01 protocol
c) 802.11 protocol
d) 802.10 protocol
7) A _________ is a device that alters the physical quantity as it can cause a mechanical component to
move after getting some input from sensor .
a) Sensors
b) Actuators
c) Both a and b
d) None of the above
8) Encrypted data can be impossible to view without the ______
ASSIGNMENT-5
a) Key
b) Password
c) Evidence
d) None of the mentioned
9) In EMCI Model, ___________ is the phase during which crime is reported to some authority
a) Awareness
b) Planning
c) Storage
d) Collection
10) When Accessing security and responding to security incidents a network analyser can help you
_____.