ExamGecko
Home Home / ASIS / PSP

ASIS PSP Practice Test - Questions Answers, Page 11

Question list
Search
Search

Which of the following is NOT the type of viruses?

A.
Innocuous Virus
A.
Innocuous Virus
Answers
B.
Humorous Virus
B.
Humorous Virus
Answers
C.
Hostile Virus
C.
Hostile Virus
Answers
D.
Altering Virus
D.
Altering Virus
Answers
Suggested answer: C

When sudden widespread destruction of data both on the computer system and on the peripheral devices occurs, the machine is possibly infected with a:

A.
Innocuous Bug
A.
Innocuous Bug
Answers
B.
Catastrophic Virus
B.
Catastrophic Virus
Answers
C.
Hostile worm
C.
Hostile worm
Answers
D.
Trojan Horse
D.
Trojan Horse
Answers
Suggested answer: B

Worms take over computer memory and deny its use to legitimate programs.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Unintentional access to software code is referred to as:

A.
Bomb
A.
Bomb
Answers
B.
Trapdoor
B.
Trapdoor
Answers
C.
Backdoor
C.
Backdoor
Answers
D.
Trojan Horse
D.
Trojan Horse
Answers
Suggested answer: C

Tapping without authorization into communication lines over which digitized computer data and messages are being sent is called:

A.
Electronic eavesdropping
A.
Electronic eavesdropping
Answers
B.
War driving
B.
War driving
Answers
C.
Digital beating
C.
Digital beating
Answers
D.
Standard digitizing
D.
Standard digitizing
Answers
Suggested answer: A

Some people are willing to copy software and resell it or give it away; this authorized copying of copyrighted computer programs is called:

A.
Identify theft
A.
Identify theft
Answers
B.
War driving
B.
War driving
Answers
C.
Unauthorized access to software
C.
Unauthorized access to software
Answers
D.
Software privacy
D.
Software privacy
Answers
Suggested answer: D

Information contained in buffers or random access memory is kept until the space is written over on the machine is turned off is known as:

A.
Random memory
A.
Random memory
Answers
B.
Scavenging memory
B.
Scavenging memory
Answers
C.
Awaiting memory
C.
Awaiting memory
Answers
D.
Search memory
D.
Search memory
Answers
Suggested answer: B

The sites that are partially configured but are missing the central computer are called:

A.
Hot sites
A.
Hot sites
Answers
B.
Warm sites
B.
Warm sites
Answers
C.
Cold sites
C.
Cold sites
Answers
D.
Frequent sites
D.
Frequent sites
Answers
Suggested answer: B

Ideally a business should have four sets of backup files;

A.
with one set of files staying on-site and three sets of files being stored off-site
A.
with one set of files staying on-site and three sets of files being stored off-site
Answers
B.
with two of files staying on-site and two sets of files being stored off-site
B.
with two of files staying on-site and two sets of files being stored off-site
Answers
C.
with three set of files staying on-site and one set of files being stored off-site
C.
with three set of files staying on-site and one set of files being stored off-site
Answers
D.
with four set of files staying on-site and no set of files being stored off-site
D.
with four set of files staying on-site and no set of files being stored off-site
Answers
Suggested answer: A

Which of the following are the four types of lock-down systems?

A.
locks, plates, cables and alarms
A.
locks, plates, cables and alarms
Answers
B.
cages, plates, bolts and alarms
B.
cages, plates, bolts and alarms
Answers
C.
cages, plates, cables and alarms
C.
cages, plates, cables and alarms
Answers
D.
cages, padlock, cables and alarms
D.
cages, padlock, cables and alarms
Answers
Suggested answer: C
Total 182 questions
Go to page: of 19