ITA430 Solved Quizzes
BY
http://vustudents.ning.com
An agent is a software program that is _____
Select correct option:
Triggers by human
Not capable of autonomous action.
Capable of autonomous action in its environment in order to meet its objectives
None
ASP runs best on ______.
Select correct option:
Internet information Software
Intranet Information Software
Intranet Information Server
Internet Information Server
What is/are the methods to track the customer.
Select correct option:
Database
Cookies
Hidden Fields
All
Large companies establish connections between their e-commerce software and their existing accounting system by using a type of software called
______.
Select correct option:
Shareware
Freeware
Middleware
None
Question # 5 of 10 ( Start time: 01:55:19 AM ) Total Marks: 1
Password attacks are basically a result of _____
Select correct option:
Back door
Sniffing
Eavesdropping
None of the Above
Question # 6 of 10 ( Start time: 01:56:03 AM ) Total Marks: 1
Caching ______.
Select correct option:
have no effect on downloading of the page
saves the time of downloading the page
increase the time of downloading the page
None of Above
Question # 7 of 10 ( Start time: 01:56:58 AM ) Total Marks: 1
. A program that performs a specific function such as creating invoices/bills or processing payment received from customers is called ______.
Select correct option:
Firewall
Application program
Protocol
Web Services
Question # 8 of 10 ( Start time: 01:57:54 AM ) Total Marks: 1
Programs that work with the browser to enhance its capabilities.
Select correct option:
Driver
Flash
PlugIn
None of Above
Question # 9 of 10 ( Start time: 01:58:10 AM ) Total Marks: 1
Agents can be used for _____
Select correct option:
Comparisons
Filtering
Web crawling
All
Question # 10 of 10 ( Start time: 01:58:53 AM ) Total Marks: 1
secure, dedicated point to point connection over the internet ______.
Select correct option:
Metropolitan area Network
Local area Network
Wide Area Network
Virtual Private Network
Question # 7 of 10 ( Start time: 04:06:28 PM ) Total Marks: 1
Branch to headquarter network _____.
Select correct option:
APN
VPN
NPV
PNA
ERP Stands for
Select correct option:
Entrepreneur Resource Planning
Enterprise Rescue Planning
Enterprise Resource Program
Enterprise Resource Planning
Enterprise Resource Planning
Enterprise Resource Planning (ERP) is a concept that integrates all aspects of a business e.g, accounting, logistics, manufacturing, marketing, planning, project management etc. at a single place. An ERP system such as SAP is expensive. E-commerce sites/software has to fully integrate with ERP software, wherever it is used.
Enterprise Resource Planning (ERP) is a concept
Select correct option:
That integrates some aspects of business, at many locations.
That integrates all aspects of a business at a single place.
That integrates some aspects of business, at some locations.
That integrates all aspects of business, at many locations.
Proxy Server can _____.
Select correct option:
Speed up the processing of http requests by caching web pages
Translate HTTP request between trusted and un trusted network
Can also act as a firewall filtering requests for certain web pages
All of Above
Extranet formed when ____.
Select correct option:
When two or more internet is connected to each other.
When two or more WAN are connected to each other.
When two or more intranets are connected to each other.
When two or more LAN is connected to each other.
secure, dedicated point to point connection over the internet ____.
Select correct option:
Metropolitan area Network
Local area Network
Wide Area Network
Virtual Private Network
Plug in is ______.
Select correct option:
Program that make the computer server.
Programs that work with the browser to enhance its capabilities.
Program that communicate with the client from the server.
None of Above
ERP example is __
Select correct option:
PAS
DBMS
SAP
ASP
Performance of the web server measured in ___.
Select correct option:
A - Throughput
B - Response Time
A & B
None of Above
Throughput is ______.
Select correct option:
No of instruction a server execute in one second.
No of session a server handle.
No of http request that a web server can handle.
None of Above
Throughput, which is the number of http requests that a particular server hardware and
software can handle in the unit time; and
Select correct option:
Internet information Software
Intranet Information Software
Intranet Information Server
Internet Information Server
Agents can be used for ___
Select correct option:
Comparisons
Filtering
Web crawling
All
An agent is a software program that is capable of autonomous action in its environment in order to meet its
objectives. Agents can be used for comparisons, filtering, web crawling, auctions etc. For example, there
may be buyer agents and seller agents each with their goals and constraints. They can negotiate deals on
behalf of the users. Agents can monitor health indicators and alert the individuals under given conditions.
Large companies establish connections between their e-commerce software and their existing accounting system by using a type of software called ______.
Select correct option:
Shareware
Freeware
Middleware
None
Large companies establish connections between their e-commerce software and their existing acco
system by using a type of software called Middleware which is a part of e-commerce software package
CERT ______.
Select correct option:
Computer Elegant Response Time
Computer Emergency Response Time
Computer Efficient Response Time
Computer Enter Response Time
Computer Emergency Response Time (CERT)
Systems Administrator, Audit, Network and Security Institute (SANS Institute)
The best response that the experts have come up with to tackle the security issue is in terms of
cryptography.
SANS stands for _____.
Select correct option:
System Administration, Authentication, Network and Security Institute
Software Authentication, Audit, Network and Security Institute
Systems Administrator, Audit, Network and Security Institute
None of Above
Application gateway firewall operate at ____.
Select correct option:
A -Session Layer
B - Network Layer
A & B
None of Above
It operates at application layer of the OSI Model. It uses strong user authentication to verify identity of a
host attempting to connect to the network using application layer protocols such us FTP. In contrast to
packet filter firewall, it filters the requests rather than packets entering/leaving the network. It can block any
outgoing HTTP or FTP requests.
Select correct option:
Time a server take to process one request.
Time a server take to process all the request.
Time a server take to process some request.
Time a server take to process ten request
HTTP is a _____.
Select correct option:
State Oriented
Stateless
A&B
None of Above
What is/are the methods to track the customer.
Select correct option:
Database
Cookies
Hidden Fields
All
DoS stand for ______.
Select correct option:
Disk Operating System
Denial of Services
Do or stand
Disk out System
What is web serve?
Select correct option:
Computer that delivers (serves up) web pages
Computer that is big
Computer that is Fast
None of Above
One Tier Architecture ______.
Select correct option:
The entire processing may take place at individual terminal.
The entire processing may take place at different terminal.
The entire processing may not take place at individual terminal.
None of Above
In 1-tier architecture, the entire processing takes place at a single place/zone.
Password attacks are basically a result of ___
Select correct option:
Back door
Sniffing
Eavesdropping
None of the Above
Such attacks are basically a result of eavesdropping through which the hacker is able to know the account ID or password of a particular user. Then using it the hacker gains access to the network and gather information such as user names, passwords, computer names, resources etc. That can lead to modification, deletion or rerouting of network data.
Self hosting ____.
Select correct option:
Companies may opt to run a server in house
Companies may not opt to run a server in house
Companies may opt rent server
None of Above
An agent is a software program that is ___
Select correct option:
Triggers by human
Not capable of autonomous action.
Capable of autonomous action in its environment in order to meet its objectives
None
An agent is a software program that is capable of autonomous action in its environment in order to meet its objectives. Agents can be used for comparisons, filtering, web crawling, auctions etc. For example, there may be buyer agents and seller agents each with their goals and constraints. They can negotiate deals on
behalf of the users. Agents can monitor health indicators and alert the individuals under given conditions.
IDS Stands for ______.
Select correct option:
Intrusion Defense System
Intervention Detection System
Intervention Defense System
Intrusion Detection System
In distributed denial of service attack, the compromised system itself is used as a source for further attacks. The use of firewalls and a proper Intrusion Detection System (IDS) can minimize
Can not block any outgoing HTTP or FTP requests
Can block any outgoing HTTP but not FTP requests
Can not block any outgoing HTTP but FTP requests
Can block any outgoing HTTP or FTP requests
Application gateway firewall
It operates at application layer of the OSI Model. It uses strong user authentication to verify identity of a
host attempting to connect to the network using application layer protocols such us FTP. In contrast to
packet filter firewall, it filters the requests rather than packets entering/leaving the network. It can block any
outgoing HTTP or FTP requests.
Caching ____.
Select correct option:
have no effect on downloading of the page
saves the time of downloading the page
increase the time of downloading the page
None of Above
Worms have the characteristics;
Select correct option:
Can replicate it
Have the capability to travel without any help or human action
Can spread from computer to computer
All
Branch to headquarter network _____.
Select correct option:
APN
VPN
NPV
PNA
mote access capabilities to a compromised machine.
Select correct option:
Back Doors
Virus
Worms
Trapdoors
Back Doors are those hostile programs which, when run on a machine, install hidden services in order to give attackers remote access capabilities to a compromised machine. Trojan horses are those programs that appear harmless but actually have some malicious purpose.
E-commerce Site must provide ______.
Select correct option:
Transaction processing
Shopping cart capabilities
A catalog display
All of the above
Circuit level firewall operate at the ______.
Select correct option:
Data Link
Presentation
Network
Transport
It is quite similar to the packet filter firewall. It also works on the basis of a set of rules for filtering packets but operates at the transport layer of the OSI Model so has greater functionality. As a rule, the higher the layer of OSI model where a firewall operates, the more sophisticated is the firewall. It can make packets sent from internal network to a destination outside the firewall appear as if they originated at the firewall. Thus information regarding hosts on the internal network remains secret. It can also determine whether TCP/IP connection between a host and a machine outside firewall has been properly established. Thus it can cut off any connection which has been hijacked by a hacker trying to pass through the firewall.
Those hostile programs which, when run on a machine, install hidden services in order to give attackers remote access capabilities to a compromised machine.
Select correct option:
Back Doors
Virus
Worms
Trapdoors
Front end consist of ______.
Select correct option:
Information which invisible to the user and he can interact with the same through some interface.
Information which visible to the user and he can not interact with the same through some interface.
Information which visible to the user and he can interact with the same through some interface.
Information which is hidden.
Asp, JSP, PHP ?
Select correct option:
Server Side Scripts
Client Side Script
A & B
None of Above
SANS stands for ______.
Select correct option:
System Administration, Authentication, Network and Security Institute
Software Authentication, Audit, Network and Security Institute
Systems Administrator, Audit, Network and Security Institute
None of Above
Proxy Server can ______.
Select correct option:
Speed up the processing of http requests by caching web pages
Translate HTTP request between trusted and un trusted network
Can also act as a firewall filtering requests for certain web pages
All of Above
Response time ______.
Select correct option:
Time a server take to process one request.
Time a server take to process all the request.
Time a server take to process some request.
Time a server take to process ten request
attacks are basically a result of _____
Select correct option:
Back door
Sniffing
Eavesdropping
None of the Above
IDS Stands for ______.
Select correct option:
Intrusion Defense System
Intervention Detection System
Intervention Defense System
Intrusion Detection System
Question # 8 of 10 ( Start time: 02:45:30 PM ) Total Marks: 1
ASP runs best on ______.
Select correct option:
Internet information Software
Intranet Information Software
Intranet Information Server
Internet Information Server
Plug in is ______.
Select correct option:
Program that make the computer server.
Programs that work with the browser to enhance its capabilities.
Program that communicate with the client from the server.
None of Above
Question # 10 of 10 ( Start time: 02:47:59 PM ) Total Marks: 1
It occurs when a customer clicks at checkout or confirm order button and is subjected to some payment ______.
Select correct option:
Transaction Processing
E cash System
E Funds system
None of Above
In this type of attack the hacker has the ability to monitor network traffic using some kind of network monitoring software.
Select correct option:
Snooping
Sniffing
Eavesdropping
All of Above
Eavesdropping/ sniffing/snooping
In this type of attack the hacker has the ability to monitor network traffic using some kind of networkmonitoring
software. For example, a hacker may install some backdoor or Trojan horse that can monitor