IT Privacy
IT Privacy
Home
End of quiz
You are at the end; press Finished to complete and grade the quiz.
You can review your answers below and click Edit if you want to change any.
Finished
Question 1
The response time and transit time is used to measure the which type parameter of a network?
Response: Performance
Question 2
The database that allows a system administrator to associate a function with the relation is called:
Question 3
1 of 5 16-07-2023, 10:14 pm
4.4 IT Privacy and Security - https://learn.jainuniversity.ac.in/student_t... https://learn.jainuniversity.ac.in/student_take_quiz_assignment/start/40...
Question 4
Quantitative techniques used to solve business problems are called:
Question 5
What is the one common way to maintain data availability?
Question 6
Information should be accurate, timely, complete, and
Response: Concise
Question 7
Main objective of risk assessment:
Question 8
In the computer networks, the encryption techniques are primarily used for improving what parameter?
Response: Security
Question 9
Acceptable risk is usually:
Question 10
Two forms of risk assessments are:
Question 11
2 of 5 16-07-2023, 10:14 pm
4.4 IT Privacy and Security - https://learn.jainuniversity.ac.in/student_t... https://learn.jainuniversity.ac.in/student_take_quiz_assignment/start/40...
Response: Vulenerabilty
Question 12
To performs data conversion and subordination, and application communication and messaging services what is
EAI software provides:
Response: middleware
Question 13
Which is the first point where the security enforcement is needed:
Response: administration
Question 14
To ensure that an organization’s password policy is effective, it must provide two key elements: difficult to
guess; and what is the next one?
Question 15
Which of the following is NOT a TLA for a popular integration style?
Response: EEE
Question 16
RE represents:
Question 17
One common way to maintain data availability is:
Question 18
Three objectives of information security:
3 of 5 16-07-2023, 10:14 pm
4.4 IT Privacy and Security - https://learn.jainuniversity.ac.in/student_t... https://learn.jainuniversity.ac.in/student_take_quiz_assignment/start/40...
Question 19
which of the following assessments similar to EIA:
Question 20
Purpose of the “screening” step in EIA:
Question 21
What assess the risk and your plans for risk mitigation and revise these when you learn more about the risk?
Question 22
In general how many key elements constitute the entire security structure?
Response: 3
Question 23
In system hacking, which of the following is the most crucial activity?
Question 24
To accept the potential risk and continue operating or to implement controls to lower the risk to an acceptable
level is termed as:
Question 25
Applications that create queries dynamically can be considered as a risk source of:
Response: injection
Question 26
The violation of principle if the computer is no more accessible denotes:
4 of 5 16-07-2023, 10:14 pm
4.4 IT Privacy and Security - https://learn.jainuniversity.ac.in/student_t... https://learn.jainuniversity.ac.in/student_take_quiz_assignment/start/40...
Response: Availaibity
Question 27
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?
Question 28
The information security technology is used for avoiding browser-based hacking is called as:
Question 29
Risk management encompasses three processes: risk assessment, risk mitigation, and what other element?
Question 30
Lack of access control policy is :
Response: Vulnerability
5 of 5 16-07-2023, 10:14 pm