Try to answer these 200+ Information System and Security MCQs and check your understanding of the Information System and Security subject. Scroll down and let's begin!
A. A very low percentage (somewhere around 1%)
B. A low percentage (around 10%)
C. A moderate percentage (around 25%)
D. A high percentage (around 50%)
E. A very high percentage (around 80%)
A. Virtualization
B. Firewall logs
C. Network Layer
D. IEEE 802.1x
A. Content-filtering software
B. Google
C. Emoney
D. Pervasive
A. Mesh networks
B. Pervasive networks
C. Global networks
D. Fixed networks
E. Ubiquitous networks
A. Web harvesting
B. Cybersquatting
C. Intelligent agents
D. Antispyware
A. Operating systems
B. Application servers
C. Database management systems
D. Platforms
E. Programming languages
A. A mnemonic
B. An input device
C. An output device
D. Software
A. Guidelines
B. Acceptable use policies
C. Label
D. Information systems security
A. CryptoHeaven
B. Message-digest
C. Digital signature
D. Idle CPU Time
A. Trace
B. Bus
C. Route
D. Connection
A. Parallel operation
B. Direct changeover
C. Phased implementation
D. Pilot
A. Flat file
B. Schema
C. Relational system
D. User view
A. Structured
B. Report generator
C. Analytical
D. Scale up, scale out
A. Befriending someone who works for the company
B. Finding a single unlocked door in a virtual hallway
C. None of the above
A. Subject
B. Target
C. Object
A. Primary key
B. Autonumber.
C. Central entity
A. Theory of evolution
B. Theory of relativity
C. Compton Effect
A. GPS transmitters
B. Wi-Fi receivers
C. GPS amplifiers
D. GPS receivers
A. Two
B. Three
C. Four
A. Audit trails
B. Trap trails
C. Batch trails
D. Control trails
A. Motivating users to comply with security policies
B. Informing users about trends and threats in society
C. Teaching employees about security objectives
D. All of the above
A. WPA
B. SSL
C. WIP
D. OTP
A. Is more difficult to break down
B. Has no inherent order
C. Is easier to query and aggregate
D. Is more difficult to link together
A. Proxy server
B. Social engineering
C. Virtual private network
D. Secure Sockets Layer
A. SOCIOTECHNICAL APPROACH
B. SOFTWARE AS A SERVICE
C. DYNAMIC TICKET PRICING
D. COMPETITIVE ADVANTAGE
A. Use the password more than three times in a day
B. Write down your password
C. Use virtual keyboards to enter your password
D. Create passwords containing multiple special characters
A. Immediately change the password they are given to a password of their own
B. Documenting position sensitivity enables security personnel to prioritize their activities.
C. The financial losses faced by companies due to human error are enormous.
D. Personal identification number
A. Use verification procedures to ensure data accuracy.
B. Set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.
C. Spam
D. Cybersquatting
A. Weighted factor analysis
B. Operational feasibility
C. Disadvantage
D. Data Classification Scheme
A. Systems
B. SCSI
C. Synchronous
D. InfiniBand
A. Users
B. Hardware
C. Software
D. Data
A. Spider
B. WiMAX
C. Home
D. Wide
A. Domain tasting
B. Smart cards
C. Cybersquatting
D. Government-to-citizen
A. Index
B. User interface
C. False
D. Primary key
A. Captive
B. Unstructured
C. Inner
D. Outer
A. Control
B. Sorted
C. COUNT
D. Date
A. Landscape
B. Portrait
C. Normal
D. Page layout
A. ROLLBACK
B. COMMIT
C. DELETE
D. UPDATE
E. DELETE
A. Overflow
B. Server
C. Simulation
D. Customer
A. Disp data
B. Ls -l data
C. Ls data
D. Cat data
A. Banded
B. Tables
C. Tab stop
D. True
A. Assessing abnormal behavior. . . explaining why behavior occurs
B. Explaining why behavior occurs . . . predicting behavioral patterns
C. Assessing abnormal behavior . . . describing patterns of behavior
D. Describing patterns of behavior . . . explaining why behavior occurs
A. Storage area networks
B. Wireless body sensor networks
C. Wireless local area networks
D. None of these
A. Bandwidth
B. Kensigton
C. Scareware
D. Fiber-optic
A. Signature
B. Data backups
C. Viruses and worms
D. Buffer overflow
A. Remote attacks requiring user action; remote attacks requiring no user action
B. Remote attacks requiring no user action; attacks by a programmer developing a system
C. Remote attacks requiring no user action; remote attacks requiring user action
D. Distributed remote attacks requiring user action; attacks by a programmer developing a system
A. All of the above
B. Rating and filtering
C. Application-level firewall
D. Proxy
A. Encryption
B. Firewall
C. Password
D. Biometrics
A. Procedure
B. Software
C. Information
D. Data
A. Computer knowledge
B. Computer fluency
C. Computer digitization
D. Computer information
A. Worm
B. Firewall
C. Trojan horse
D. Encryption algorithm
A. Stream
B. Digest
C. Algorithm
D. Key
A. Botnet
B. Private key
C. Public key
D. Cookie
A. Message authentication
B. Message integrity
C. None of the above
D. All of the above
A. Support and improve decision making
B. Automated customer service
C. Apply selected modeling techniques
D. Present the results in an easy to understand manner
A. The digital mode to the analog mode
B. The analog mode to the digital mode
C. None of these
D. Both of these
A. Browser mapping
B. Browser sniffing
C. Visitor identification
D. Personalization
A. Analyst
B. Programmer
C. Manager
D. User
A. Warehouse
B. Clipboard
C. Storehouse
D. Gallery
A. Slowly, rapidly
B. Rapidly, slowly
C. Slowly, incrementally
D. Both formats of data change at the same rate
A. WPA2
B. Temporal Key Integrity Protocol (TKIP)
C. Cyclic redundancy check (CRC)
D. Message Integrity Check (MIC
A. The organization should protect your computer and its files
B. You should protect the organization's computers and files
C. You should inform the IS about any software upgrades
D. You will never face a network problem
A. Maximum latency.
B. Minimum latency.
C. Both A and B
D. Neither A nor B
A. Users can access data randomly
B. Users interact with the information system
C. The system process transactions completely when and where they occur
D. All of these
A. Full
B. Inner
C. Outer
D. Set
A. Capacity planning
B. Virtualization
C. Localization
D. Measured service
A. Remains constant with time
B. Sometimes depreciates and at other times appreciates with time
C. Appreciates with time, and never depreciates
D. Depreciates with time, and never appreciates
A. Value of smoothing constant will either be less than zero or greater than one
B. Future forecasts will rely solely upon expertise of people in developing forecasts
C. Mean square error will be negative
D. Forecast will overshoot the actual values
A. Mobile banking
B. Wireless electronic payment
C. Wireless wallets
D. All of these
A. NTFS
B. FAT
C. HFS
D. FAT32
A. Identification
B. Removal
C. Detection
D. Prevention
A. IMAP (Internet Message Access Protocol)
B. Community edit
C. Requests for improvements
D. None of these
A. AND
B. NOT
C. OR
D. All of these
A. Certificate Signatory (CS)
B. Digital Signer (DS)
C. Certificate Authority (CA)
D. Signature Authority (SA
A. To verify the authenticity of the Registration Authorizer
B. Certificate Authority (CA)
C. Online Certificate Status Protocol (OCSP)
D. Is the management of digital certificates
A. Key
B. RSA
C. Hash
D. AES
A. >
B. <>
C. =
D. <
A. SSID
B. MAC
C. Private key
D. Symmetric
A. Directory servers, central authentication servers
B. Central authentication servers, metadirectory servers
C. Central authentication servers, directory servers
D. Metadirectory servers, central authentication servers
A. You need the key it was encrypted with to decrypt it so you can read the message.
B. Help desk
C. You need the private key to decrypt the message so you can read it.
D. Upper- and lowercase letters of the alphabet with no words in any language, some special characters and some numbers, and will be at least 10 characters long
A. Top-down.
B. Rapid development.
C. Bottom-up.
D. Waterfall
A. Authenticates.
B. Identifies.
C. Conceals.
D. Encrypts
A. One
B. Four
C. Three
D. Two
A. Scan and clean infected systems
B. Log the incident
C. Unplug the machines from the network
D. Notify appropriate organization leaders
A. Electronic
B. Flame point
C. Flame
D. Sensor
A. It is exclusive to small and medium-sized enterprises (SMEs)
B. It employs a database of key operational and planning data that can be shared by all
C. It helps a business function isolate information other functions and other levels of management.
D. It is only used by large organizations
A. Market research
B. It employs a database of key operational and planning data that can be shared by all
C. Online transaction processing
D. Supply chain management
A. Lock.
B. Guard.
C. Shield.
D. Firewall.
A. Parallel
B. Phased-in-phased-out
C. Plunge
D. Pilot
A. Iterative SDLC
B. Systems analysis and design
C. Project development plan
D. System development life cycle
A. Economic
B. Operational
C. Scheduling
D. Technical
A. Accuracy
B. AACSB
C. Accurate
D. None of these
A. Media
B. Metadata
C. BBS
D. HTML
A. Workstation
B. Personal computer
C. Mainframe
D. Server
E. Supercomputer
A. Plaintext
B. Plain text
C. Simpletext
D. Simple text
A. Horizontal exchanges
B. Vertical exchanges
C. None
A. RF jamming
B. War driving
C. Eavesdropping
D. Telemetry
E. Installing rogue access devices
A. Strategy
B. Sequence
C. Process
D. Anomaly
A. Footprint
B. WiMAX
C. Geostationary
D. 802.11g
A. Database
B. Model base
C. User interface
D. Inference engine