Tuesday, February 12, 2008

NCFM MODEL TEST PAPER Compliance Officers (Corporates) Module

Q1Which of the following committees is non-mandatory to be constituted by listed company?
[ 2 Marks ]

(a) Share Transfer Committee
(b) Shareholders/Investors Grievance Committee
(c) Remuneration Committee
(d) Audit Committee
(e) I am not attempting the question
Q2State which of the following is false? As per the Chapter XI of the SEBI (DIP) Guidelines 2000 specifying the Guidelines for Book Building an issuer company may make an issue of securities to the public through prospectus in the following manner: [ 1 Mark ]

(a) 100% of the net offer to the public
(b) 100% of the net offer to the public through book building process
(c) 75% of the net offer to the public through book building process and 25% at the price
determined through book building
(d) None of the above
(e) I am not attempting the question
Q3In case of default in repayment to small depositors, intimation of such fact should be given within ________. [ 1 Mark ]

(a) 60 days from the date of default
(b) three months from the date of default
(c) 15 days from the date of default
(d) one month from the date of default
(e) I am not attempting the question
Q4State which of the following is false? As per Chapter X of the SEBI (DIP) Guidelines 2000 stating the Guidelines for issue of debt instruments, in case of PCDs/NCDs the offer document shall contain ________________. [ 2 Marks ]

(a) premium on redemption
(b) premium on redemption and Yield on redemption of the PCDs/NCDs
(c) period of maturity
(d) redemption amount
(e) I am not attempting the question
Q5As per the SEBI (ESOS and ESPS) Guidelines 1999, ______________________. [ 2 Marks ]

(a) an employee who is a promoter or belongs to the promoter group shall not be eligible to
participate in the ESPS
(b) an employee who is promoter shall be eligible to participate in the ESPS
(c) an employee who belongs to the promoter group shall be eligible to participate in the ESPS
(d) None of the above
(e) I am not attempting the question
Q6As per the SEBI (ESOS and ESPS) Guidelines 1999 state which of the following is false? The Board of Directors shall disclose in the Director's Report the following details of the ESPS: [ 2 Marks ]

(a) Diluted earnings per share
(b) Earnings per share
(c) Price at which the shares are issued
(d) Number of shares issued in ESPS
(e) I am not attempting the question
Q7Division of capital is subject to the approval by the Tribunal. [ 2 Marks ]

(a) FALSE
(b) TRUE
(c) I am not attempting the question
Q8As per the SEBI (Substantial Acquisition of Shares and Takeovers) Regulations, 1997, for offers which are subject to the minimum level of acceptance and the acquirer does not want to acquire a minimum of 20%, the following percentage of the consideration payable under the public offer in cash shall be deposited in the escrow account: [ 2 Marks ]

(a) 90%
(b) 25%
(c) 75%
(d) 50%
(e) I am not attempting the question
Q9In response to the notice of removal of Mr. D, director of Company X Ltd., he sent a representation. His representation could not be sent alongwith the notice of the Annual General Meeting for want of time. Resolution for his removal was passed at that meeting. Mr. D contended that since his representation was not forwarded to all memers and directors, resolution for his removal stands invalid. Is his contention valid? [ 2 Marks ]

(a) Yes, received late is no ground.
(b) No, as it was received late.
(c) I am not attempting the question
Q10State which of the following is False? The Guidelines for Preferential Issues in the SEBI (DIP) Guidelines 2000 is applicable to __________. [ 1 Mark ]

(a) All types of financial instruments
(b) All financial instruments which would be converted into equity shares at later date
(c) All financial instruments which would be exchanged into equity shares at later date
(d) All equity shares
(e) I am not attempting the question
Q11As per the SEBI (DIP) Guidelines 2000, for raising of funds through public issues, the due date for the final post issue monitoring report for all issues shall be ____________. [ 2 Marks ]

(a) 3rd day from the date of listing or 80 days from the date of closure of the subscription
of the issue whichever is earlier
(b) 3rd day from the date of listing or 50 days from the date of closure of the subscription
of the issue whichever is earlier
(c) 3rd day from the date of listing or 75 days from the date of closure of the subscription
of the issue whichever is earlier
(d) 3rd day from the date of listing or 78 days from the date of closure of the subscription
of the issue whichever is earlier
(e) I am not attempting the question
Q12A shareholder, Mr. P, holding 550 shares of listed company makes an application to the company for sub-division of its shares. The company charges certain fees from Mr. P. State whether the action of the company is correct? [ 1 Mark ]

(a) No
(b) Yes
(c) Yes, only if the fees are as agreed with the Stock Exchange.
(d) Yes, only if the fees are as agreed by the member.
(e) I am not attempting the question
Q13Omission to send notice of annual General Meeting to member invalidates the resolution passed in that meeting. [ 2 Marks ]

(a) FALSE
(b) TRUE
(c) I am not attempting the question
Q14As per the SEBI (Substantial Acquisition of Shares and Takeovers) Regulations, 1997, any person other than an acquirer who has made the first public announcement, shall make a competitive bid within _______. [ 2 Marks ]

(a) 45 days of the public announcement of the first offer
(b) 21 days of the public announcement of the first offer
(c) 30 days of the public announcement of the first offer
(d) 14 days of the public announcement of the first offer
(e) I am not attempting the question
Q15The main object of the Securities Contracts (Regulation) Act 1956 is _________. [ 2 Marks ]

(a) to protect the interest of the investors and promote and develop the securities market
(b) to control the monopolistic and restrictive trade practices followed by the listed companies
(c) to consolidate and amend the law relating to companies and certain other associations
(d) to prevent undesirable transactions in securities by regulating the business of dealing therein
(e) I am not attempting the question
Q16Board of directors may give guarantee without being previously authorised by way of special resolution if ______________. [ 2 Marks ]

(a) it has been approved by unanimous resolution of the board
(b) it has been approved by the Central Government
(c) it has been approved within six months
(d) it has been approved within twelve months in general meeting
(e) I am not attempting the question
Q17Contracts entered into by the company before commencement of business are __________.
[ 2 Marks ]

(a) valid
(b) voidable
(c) void
(d) not binding till date of commencement
(e) I am not attempting the question
Q18As per the SEBI (ESOS and ESPS) Guidelines 1999, the amount payable by the employee, if any, at the time of grant of option ____________. [ 1 Mark ]

(a) may be refunded by the company if the option is not exercised by the employee
within the exercise period
(b) may be retained by the company in suspense account if the option is not exercised
by the employee within the exercise period
(c) may be forfeited by the company if the option is not exercised
by the employee within the exercise period
(d) None of the above
(e) I am not attempting the question
Q19As per Chapter X of the SEBI (DIP) Guidelines 2000 stating the Guidelines for issue of debt instruments, where the company desires to rollover the debentures issued by it, it shall file ____________, a copy of the notice of the resolution, to be sent to the debenture-holders for the purpose, through merchant banker, prior to dispatching the same to the debenture-holders.
[ 1 Mark ]

(a) with SEBI
(b) with Registrar of Companies
(c) with Debenture Trustees
(d) None of the above
(e) I am not attempting the question
Q20As per Chapter X of the SEBI (DIP) Guidelines 2000 specifying the guidelines for issue of capital by Designated Financial Institutions (DFIs), if a DFI fails to meet the criteria of maintenance of Debt - Equity ratio (DER) and Notional Debt Service Coverage Ratio (NDSCR), no dividend shall be declared by such DFI for the relevant year except with the approval of the trustees and the rate of dividend shall not exceed ____________.
[ 2 Marks ]

(a) 15%
(b) 20%
(c) 5%
(d) 10%
(e) I am not attempting the question
Q21Notice of meeting of annual General Meeting need not be issued to the auditor of the company.
[ 2 Marks ]

(a) TRUE
(b) FALSE
(c) I am not attempting the question
Q22As per the Guidelines for Preferential Issues in the SEBI (DIP) Guidelines 2000, the details of unutilised monies shall be disclosed out of the preferential issue proceeds _____________.
[ 2 Marks ]

(a) under the head sources of funds
(b) need not be disclosed
(c) under separate head in the balance sheet
(d) as per Schedule VI of the Companies Act 1956
(e) I am not attempting the question
Q23As per the SEBI (Substantial Acquisition of Shares and Takeovers) Regulations, 1997, SEBI shall forward the application of exemption to the Takeover Panel within __________. [ 1 Mark ]

(a) 15 days of the receipt of the application
(b) 10 days of the receipt of the application
(c) 5 days of the receipt of the application
(d) 20 days of the receipt of the application
(e) I am not attempting the question
Q24The resolution to be passed, in terms of section 81(1A) with respect to pricing of shares arising out of warrants etc., as per the Guidelines for referential Issues in the SEBI (DIP) Guidelines 2000, is required to clearly specify __________. [ 1 Mark ]

(a) the specified date
(b) the date of the resolution
(c) the relevant date
(d) the date on which the holder of warrants is entitled to apply for the shares
(e) I am not attempting the question
Q25What are the functions to be performed by the chairman of the Audit Committee to comply with the provisions of the listing agreement? [ 2 Marks ]

(a) To be present at the Board meeting where the minutes of the Audit committee are placed for
approval.
(b) To be an independent director and to be present at the Annual General meeting.
(c) To carry out audit of auditors.
(d) I am not attempting the question
Q26The information about the transfer of securities in the name of the beneficial owners has to be furnished ______________.
[ 1 Mark ]

(a) by the depository to the beneficial owner
(b) by the depository to the issuer
(c) by the beneficial owner to the depository
(d) by the issuer to the depository
(e) I am not attempting the question
Q27From the below mentioned persons, who can become independent director of Tamarind Ltd?
[ 2 Marks ]

(a) Mr. Lakshman, as he holds 1.5% of the equity shares of the company having voting rights.
(b) Mr. Ghanshyam, as he is supplier of the company's major raw material.
(c) Mr. Shyam, as he is an executive of the company for last 5 financial years.
(d) Mr. Ram, as he is Executive Director of Tamarind Ltd.'s subsidiary.
(e) I am not attempting the question
Q28A listed company is required to send statement to the Stock Exchange explaining the reasons to the Stock Exchange along with the Review Report in the following case: [ 2 Marks ]

(a) No statement is required to be send.
(b) If there has been delay in sending the Review Report.
(c) If the Review Report has certain qualifications or adverse remarks by the Auditors.
(d) If any item in the quarterly unaudited results varies by 20% or more from the respective
half yearly results.
(e) I am not attempting the question
Q29As per the SEBI (Substantial Acquisition of Shares and Takeovers) Regulations, 1997 with respect to bailout takeovers, the company being taken over shall be appraised taking into account the _________. [ 2 Marks ]

(a) Financial viability
(b) Technical viability
(c) None of the above
(d) I am not attempting the question
Q30State which of the following is false? As per the SEBI (DIP) Guidelines 2000, for raising of funds through public issues, the lead merchant banker shall ensure that the following are complied with in the research reports ___________. [ 2 Marks ]

(a) risk factors are not reproduced
(b) research report is based on the published information contained in the offer document
(c) advertisement code is observed
(d) None of the above
(e) I am not attempting the question
Q31State which of the following is True? The Compensation Committee with respect to ESOS shall frame suitable policies and systems to ensure that there is no violation of __________. [ 1 Mark ]

(a) SEBI (Issue of Sweat Equity) Regulations 2002
(b) SEBI (Merchant Bankers) Regulations 1992
(c) SEBI (Substantial Acquisition of Shares and Takeovers) Regulations 1997
(d) SEBI (Prohibition of Insider Trading) Regulations 1992
(e) I am not attempting the question
Q32As per the Guidelines on Initial Public Offers through the Stock Exchange on-line system in the SEBI (DIP) Guidelines 2000, the Registrar to the Issue having electronic connectivity with the Stock Exchange through which the securities are offered under the system shall be appointed by _____________. [ 2 Marks ]

(a) The Lead Manager
(b) The Stock Exchange
(c) The Merchant Banker
(d) The Company
(e) I am not attempting the question
Q33Which of the following term is defined under the Depository Act 1996? [ 1 Mark ]

(a) Record
(b) Certificate
(c) Scheme
(d) Contract
(e) I am not attempting the question
Q34As per the Guidelines for Preferential Issues in the SEBI (DIP) Guidelines 2000 in case of allotment of shares and securities convertible into equity shares at later date on preferential basis pursuant to scheme of corporate debt restructuring as per the Corporate Debt Restructuring framework specified by the Reserve Bank of India such preferential issues shall be made fully paid up _________.
[ 2 Marks ]

(a) at the date of the resolution
(b) at the time of their allotment
(c) at the time of their issue
(d) the guidelines do not apply
(e) I am not attempting the question
Q35As per the Guidelines for Preferential Issues in the SEBI (DIP) Guidelines 2000 the details of all monies utilised out of the preferential issue proceeds shall be disclosed ________. [ 2 Marks ]

(a) under an appropriate head in the balance sheet of the company
(b) under the head application of funds
(c) need not be disclosed
(d) as per Schedule VI of the Companies Act 1956
(e) I am not attempting the question
Q36In case of public company member can appoint only one proxy. [ 2 Marks ]

(a) FALSE
(b) TRUE
(c) I am not attempting the question
Q37As per the SEBI (ESOS and ESPS) Guidelines 1999, the expected life of ESOSs should not be less than _______________. [ 2 Marks ]

(a) quarter of the exercise period of the ESOSs issued
(b) three-quarters of the exercise period of the ESOSs issued
(c) one and half of the exercise period of the ESOSs issued
(d) half of the exercise period of the ESOSs issued
(e) I am not attempting the question
Q38Securities Appellate Tribunal SAT means ___________. [ 2 Marks ]

(a) SAT established under Section 23 of the Securities Contracts (Regulation) Act 1956
(b) SAT established under Section 15K of the SEBI Act 1992
(c) SAT established under Section 22 of the Securities Contracts (Regulation) Act 1956
(d) SAT established under Section 15K of the Securities Contracts (Regulation) Act 1956
(e) I am not attempting the question
Q39As per Chapter X of the SEBI (DIP) Guidelines 2000 stating the Guidelines for issue of debt instruments, redemption of debentures shall be made by the issuer company ___________.
[ 1 Mark ]

(a) as per the decision of the Debenture Trustee
(b) as per the offer document
(c) as per the debenture trust deed
(d) as per the decision of the issuer company
(e) I am not attempting the question
Q40One of the powers of the SAT is __________. (Strike off the odd one) [ 2 Marks ]

(a) delist the securities of any company from the Recognised Stock Exchange
(b) review its decisions
(c) receive evidence on affidavits
(d) issuing Commissions for the examination of witnesses or documents
(e) I am not attempting the question
Q41As per Chapter X of the SEBI (DIP) Guidelines 2000 specifying the guidelines for issue of capital by Designated Financial Institutions (DFIs), the name of the trustee / agent shall be stated in the offer document and the trust deed or any other documents for the purpose shall be executed ____________. [ 2 Marks ]

(a) within two months of the closure of the issue
(b) within four months of the closure of the issue
(c) within three months of the closure of the issue
(d) within six months of the closure of the issue
(e) I am not attempting the question
Q42As per Chapter X of the SEBI (DIP) Guidelines 2000 specifying the guidelines for issue of capital by Designated Financial Institutions (DFIs), the maximum target amount specified in the prospectus shall not exceed __________. [ 2 Marks ]

(a) four times the minimum target amount
(b) thrice the minimum target amount
(c) twice the minimum target amount
(d) five times the minimum target amount
(e) I am not attempting the question
Q43State which of the following is false? As per the Chapter XI of the SEBI (DIP) Guidelines 2000 specifying the Guidelines for Book Building, the advertisement shall contain the following: [ 1 Mark ]

(a) The names and addresses of the syndicate members as well as the bidding terminals for
accepting the bids.
(b) The method and process of bidding.
(c) The net offer to the public.
(d) The date of opening and closing of the bidding.
(e) I am not attempting the question
Q44The concerned Recognised Stock Exchange shall lose its recognition if ________. (Select the odd one) [ 1 Mark ]

(a) the scheme of corporatisation and demutualisation has been rejected
(b) it fails to submit the scheme of corporatisation or demutualization
(c) SEBI so publishes order in the Official Gazette
(d) it has not been corporatised or demutualised
(e) I am not attempting the question
Q45As per the SEBI (DIP) Guidelines 2000, for raising of funds through public issues, ensuring that the basis of allotment is finalized in fair and proper manner is the responsibility of the ____________. [ 2 Marks ]

(a) Managing Director of the Designated Stock Exchange
(b) Bankers to the issue
(c) SEBI
(d) Brokers to the issue
(e) I am not attempting the question
Q46As per Clause 42 of the listing agreement, state whether any condition precedent is required to be complied by a listed company for issue of new securities? [ 2 Marks ]

(a) Yes, to deposit with the Stock Exchange the prescribed amount, before opening the
subscription list.
(b) None
(c) Yes, to promptly notify the Stock Exchange.
(d) I am not attempting the question
Q47The Court shall take cognizance of the offence punishable under the Depository Act 1996 on complaint made by ___________. [ 1 Mark ]

(a) Central Government
(b) SEBI
(c) State Government
(d) Any of the above
(e) I am not attempting the question
Q48As per the SEBI (Substantial Acquisition of Shares and Takeovers) Regulations, 1997, no acquirer shall acquire shares or voting rights, through market purchases and preferential allotment pursuant to a resolution passed under section 81 of the Companies Act, 1956 or any other applicable law, which (taken together with shares or voting rights, if any, held by him or by persons acting in concert with him), entitle such acquirer to exercise more than ___________. [ 1 Mark ]

(a) fifty five per cent of the voting rights in the company
(b) fifty four per cent of the voting rights in the company
(c) seventy four per cent of the voting rights in the company
(d) fourteen per cent of the voting rights in the company
(e) I am not attempting the question
Q49State which of the following is true? As per the Chapter XI of the SEBI (DIP) Guidelines 2000 specifying the Guidelines for Book Building, _________. [ 1 Mark ]

(a) the book runner is required to enter into an underwriting agreement with the issuer company
(b) the book runner is required to enter into an underwriting agreement with SEBI
(c) the book runner is required to enter into an underwriting agreement with Stock Exchange
(d) None of the above
(e) I am not attempting the question
Q50As per the listing agreement, the Chairman of which Committees should be present at the Annual General meetings of the company? [ 2 Marks ]

(a) Remuneration Committee
(b) Audit Committee and Remuneration Committee
(c) Shareholders Grievance Committee
(d) Only Audit Committee
(e) I am not attempting the question
Q51Every recognised stock exchange shall furnish copy of Annual Report to ______. [ 1 Mark ]

(a) SEBI and Central Government
(b) SEBI
(c) Central Government
(d) State Government
(e) I am not attempting the question
Q52Recognised Stock Exchange may make rules or amend rules to provide for the following matters: (Select the odd one) [ 2 Marks ]

(a) Restriction of voting rights to members only in respect of the matter placed before the
Stock Exchange at any meeting
(b) Regulation of voting rights in respect of any matter placed before the stock exchange at any
meeting
(c) Restriction on the right of member to appoint another person as his proxy to attend and vote
at meeting of the stock exchange
(d) None of the above
(e) I am not attempting the question
Q53Who has been authorised under the Depository Act 1996 to make Rules? [ 2 Marks ]

(a) Securities Appellate Tribunal
(b) Central Government
(c) SEBI
(d) Depositories
(e) I am not attempting the question
Q54As per the Guidelines for Preferential Issues in the SEBI (DIP) Guidelines 2000 locked in shares/instruments may be transferred __________. [ 2 Marks ]

(a) subject to continuation of lock-in, in the hands of transferee(s) for the remaining period
(b) subject to continuation of lock-in in the hands of transferee(s) for one year
(c) subject to continuation of lock-in in the hands of transferee(s) for four years
(d) subject to continuation of lock-in in the hands of transferee(s) for three years
(e) I am not attempting the question
Q55State which of the following is false? As per the SEBI (DIP) Guidelines 2000, for raising of funds through public issues, any unsubscribed portion in any reserved category ___________.
[ 2 Marks ]

(a) may not be added back to any other reserved category
(b) may be added back to the net offer to the public
(c) may be added back to any other reserved category
(d) None of the above
(e) I am not attempting the question
Q56As per the SEBI (Substantial Acquisition of Shares and Takeovers) Regulations, 1997, any person aggrieved by an order of SEBI may prefer an appeal to ______. [ 2 Marks ]

(a) Securities Appellate Tribunal
(b) High Court
(c) Supreme Court
(d) None of the above
(e) I am not attempting the question
Q57For implementation of ESOS and ESPS as per the SEBI (ESOS and ESPS) Guidelines 1999, till the stage of framing the ESOS/ESPS and obtaining the in-principal approval from the stock exchange the company shall appoint a ______________. [ 2 Marks ]

(a) registered banker
(b) registered merchant banker
(c) registered stock broker
(d) registered portfolio manager
(e) I am not attempting the question
Q58State which of the following is false? As per the SEBI (DIP) Guidelines 2000, for raising of funds through public issues 'Qualified Institutional Buyer' shall mean ____________. [ 1 Mark ]

(a) provident funds with minimum corpus of Rs. 15 crores
(b) scheduled commercial banks
(c) mutual funds
(d) public financial institution as defined in section 4 of the Companies Act 1956
(e) I am not attempting the question
Q59Alongwith the quarterly unaudited financial results the company is required to publish segment wise revenue results and capital employed. In case of segment operations which are primarily of financial nature in such segment results indicate ____________. [ 2 Marks ]

(a) profit/loss after tax and after interest and the interest shall not include the interest pertaining
to such segment
(b) profit/loss before tax and after interest and the interest shall not include the interest
pertaining to such segment
(c) profit/loss before tax and interest and the interest shall not include the interest pertaining to
such segment
(d) I am not attempting the question
Q60As per the SEBI (DIP) Guidelines 2000, for raising of funds through public issues the outstanding underwriting commitments of merchant banker shall not exceed ___________. [ 1 Mark ]

(a) 30 times its net worth at any point of time
(b) 25 times its net worth at any point of time
(c) 20 times its net worth at any point of time
(d) 10 times its net worth at any point of time
(e) I am not attempting the question

Information Security Auditors Module - (Part 1)

Maximum Marks: 100 Pass Marks: 60
Test Duration: 120 minutes Time Left:119:54 minutes

Q1Which areas offer protection under the Copyright Act? [ 1 Mark ]

(a) Original Literary Work
(b) Original Musical Work
(c) Computer Programme
(d) All of the above.
(e) I am not attempting the question
Q2 Which of the following describes a structured walk-through test? [ 1 Mark ]

(a) All departments receive a copy of the disaster recovery plan and walk through it.
(b) Representatives from each department come together and go through the test collectively.
(c) It is performed to ensure that critical systems will run at the alternate site.
(d) Normal operations are shut down.
(e) I am not attempting the question
Q3 Why is cascading revoke not always desirable? [ 1 Mark ]

(a) Because it compromises the system security.
(b) Because it leads to unnecessary revokes.
(c) Because it hampers the system performance
(d) Because it violates database rules.
(e) I am not attempting the question
Q4Which access control technique secures information by assigning sensitivity levels to data? [ 1 Mark ]

(a) RBAC
(b) MAC
(c) DAC
(d) Biba
(e) I am not attempting the question
Q5 Which of the following is TRUE about primary markets? [ 1 Mark ]

(a) Primary markets is the place where public can buy and sell securities with one another.
(b) Primary markets are places where only short term instruments are traded
(c) Primary markets are markets where commodities are sold.
(d) Primary markets refer to the direct solicitation of funds from the public by companies.
(e) I am not attempting the question
Q6 The _________issued by SEBI aim to secure fuller disclosure of the relevant information about the issuer and the nature of issue so that the investors can take informed decision. [ 1 Mark ]

(a) Disclosure and Investor Protection Guidelines
(b) SC(R)A
(c) SEBI (Stock Brokers and Sub brokers) Rules
(d) SEBI (Prohibition of Fraudulent and Unfair Trade Practices Relating to Securities Markets) regulations
(e) I am not attempting the question
Q7 Stock Broker as per the SEBI (Stock Brokers and Sub-brokers) Rules, 1992 means __________. [ 2 Marks ]

(a) a member of the Board
(b) a member of the Clearing Corporation
(c) a member of the Stock Exchange
(d) a member of the Clearing House
(e) I am not attempting the question
Q8 Business continuity does not replace _____________. [ 1 Mark ]

(a) Facilities
(b) Insurance
(c) Interruption
(d) Product
(e) I am not attempting the question
Q9 According to IT Act what is/are offences pertaining to computer, computer network or computer program? [ 1 Mark ]

(a) Securing access to somebody else's computer.
(b) Intentionally concealing the computer source code
(c) Intentionally altering the data
(d) All of the above
(e) I am not attempting the question
Q10 Which of the following is not true about offer of shares through normal public issue? [ 2 Marks ]

(a) In normal Public issue, investors bid for shares at the floor price or above and after the Closure of the process the price is determined for allotment of shares.
(b) In case of the normal public issue the demand for an issue is known at the close of the issue.
(c) In case of offer of shares through normal public issue price at which securities will be allotted is known to an investor in advance.
(d) None of the above
(e) I am not attempting the question
Q11 Under copyright act, a copyright office for this purpose is a must [ 1 Mark ]

(a) Also requestions[ires a secluded location.
(b) And can have more then one offices if requestions[ired.
(c) FALSE
(d) TRUE
(e) I am not attempting the question
Q12 Which Risk Management methodology uses the exposure factor multiplied by the asset value to determine its outcome? [ 1 Mark ]

(a) Information Risk Management
(b) Annualized Loss Expectancy
(c) Single Loss Expectancy
(d) Annualized Rate of Occurrence
(e) I am not attempting the question
Q13 On NSE's options market, until the buyer pays in the premium, the premium due is deducted from the available _________ on a real time basis. [ 1 Mark ]

(a) cash deposit
(b) liquid net worth
(c) cash and non-cash deposit
(d) effective deposit
(e) I am not attempting the question
Q14 Find the odd one [ 1 Mark ]

(a) GRANT
(b) CASCADE
(c) REVOKE
(d) INSERT
(e) I am not attempting the question
Q15 Which of the following best describes what a disaster recovery plan should contain? [ 1 Mark ]

(a) Software, media interaction, people, hardware, management issues.
(b) Hardware, software, people, emergency procedures, recovery procedures.
(c) People, hardware, offsite facility.
(d) Hardware, emergency procedures, software, identified risk.
(e) I am not attempting the question
Q16 Which term best suits the statement 'tracks what the user did and when they did it'? [ 2 Marks ]

(a) Accounting
(b) Authorization
(c) Authentication
(d) Validation
(e) I am not attempting the question
Q17 An at-the-money option contract would generate __________upon exercise for the buyer. [ 1 Mark ]

(a) positive cash flow
(b) specified amount of cash flow
(c) no cash flow
(d) negative cash flow
(e) I am not attempting the question
Q18 The most risk from a disaster occurs when there is __________. [ 1 Mark ]

(a) Low Probability and High Vulnerability
(b) High Probability and Low Vulnerability
(c) High Probability and High Vulnerability
(d) Low Probability and Low Vulnerability
(e) I am not attempting the question
Q19 To get proper management support and approval of the plan, a business case must be made. Which of the following is least important to this business case? [ 1 Mark ]

(a) How other companies are dealing with these issues.
(b) The impact the company can endure if a disaster hits.
(c) Regulatory and legal requirements.
(d) Company vulnerabilities to disasters and disruptions.
(e) I am not attempting the question
Q20 What factor/s affect the interest rate? [ 1 Mark ]

(a) Supply of money
(b) Government borrowings
(c) Inflation rate
(d) All of the above.
(e) I am not attempting the question
Q21 Which of the following describes a parallel test? [ 1 Mark ]

(a) Normal operations are shut down.
(b) Representatives from each department come together and go through the test collectively.
(c) All departments receive a copy of the disaster recovery plan and walk through it.
(d) It is performed to ensure that some systems will run at the alternate site.
(e) I am not attempting the question
Q22 Which is the principal Act that governs the trading in securities market in India? [ 1 Mark ]

(a) Securities Contracts (Regulation) Act, 1956
(b) SEBI Act, 1992
(c) Depositories Act, 1996
(d) Companies Act, 1956
(e) I am not attempting the question
Q23 Who issues the registration to a Mutual Fund in India? [ 1 Mark ]

(a) Only SEBI
(b) SEBI for all types of Mutual Funds and additional permission from RBI in case of a Mutual Fund being a subsidiary of a bank.
(c) RBI for all types of Mutual Funds and additional permission from SEBI in case of a Mutual Fund being a subsidiary of a bank.
(d) Only RBI.
(e) I am not attempting the question
Q24 What is the Maximum Tolerable Downtime (MTD)? [ 1 Mark ]

(a) Minimum elapsed time requeired to complete recovery of application data.
(b) Maximum elapsed time requeired to move back to primary site after a major disruption.
(c) It is maximum delay businesses can tolerate and still remain viable.
(d) Maximum elapsed time requestions[ired to complete recovery of application data.
(e) I am not attempting the question
Q25 State which of the following is false? The following dealings as per the SEBI (Prohibition of Fraudulent and Unfair Trade Practices relating to Securities Market) Regulations, 2003 are prohibited _________. [ 1 Mark ]

(a) employing any manipulative device to defraud in connection with the issue of securities
(b) buying, selling or otherwise dealing in securities
(c) engaging in any act which would deceive a person in connection with the issue of securities
(d) employing any device to defraud in connection with dealing in any securities listed on a recognized stock exchange
(e) I am not attempting the question
Q26 What are the punishments for a criminal offence under the copyright law? [ 1 Mark ]

(a) Imprisonment for six months with the minimum fine of Rs. 100,000/-.
(b) Imprisonment for ten months with the minimum fine of Rs. 50,000/-.
(c) Imprisonment for six months with the minimum fine of Rs. 50,000/-.
(d) Imprisonment for six years with the minimum fine of Rs. 25,000/-.
(e) I am not attempting the question
Q27 Which of the following statements correctly describes passwords? [ 1 Mark ]

(a) They are the least expensive and most secure.
(b) They are the most expensive and least secure.
(c) They are the most expensive and most secure
(d) They are the least expensive and least secure.
(e) I am not attempting the question
Q28 What is the specialty of RADIUS server? [ 1 Mark ]

(a) System allows multiple logons
(b) User given permanent authentication
(c) Information never sent on network
(d) User friendly
(e) I am not attempting the question
Q29 Which of the following teams should not be included in an organization's contingency plan? [ 1 Mark ]

(a) Damage assessment team
(b) Legal affairs team
(c) Hardware salvage team
(d) Tiger team
(e) I am not attempting the question
Q30 According to IT Act, RBI has prescribed which system for authentication purpose? [ 1 Mark ]

(a) Hash function
(b) Asymmetric crypto system and Hash function
(c) Asymmetric crypto system
(d) Symmetric crypto system and Hash function
(e) I am not attempting the question
Q31 A password is mainly used for what function? [ 1 Mark ]

(a) Authentication
(b) Authorizations
(c) Identity
(d) Registration
(e) I am not attempting the question
Q32 Which one of the offence deems fit to be punished according to IT Act of India? [ 1 Mark ]

(a) Introducing a computer contaminant
(b) Disruption of computer networks
(c) Lascivious material published in electronic form
(d) All of the above.
(e) I am not attempting the question
Q33 Which is a punishable offence according to IT Act of India? [ 1 Mark ]

(a) Digital transmission
(b) Penetration Testing
(c) Hacking
(d) Ethical hacking
(e) I am not attempting the question
Q34 Clark-Wilson model differs from the other models in what way? [ 1 Mark ]

(a) Introducing a third access element-programs.
(b) Introducing a third access element procedures
(c) Is safest among all the models.
(d) Is the only model that focuses on integrity.
(e) I am not attempting the question
Q35 Which can you relate to a disaster? [ 1 Mark ]

(a) Event that results a business going out of business.
(b) Event that results in death.
(c) Event that results serious injury.
(d) None of the above.
(e) I am not attempting the question
Q36 Derivative includes:A) A security derived from a debt instrument, share, loan whether secured or unsecured, risk Instrument or contract for differences or any other form of security.B) A contract which derives its value from the prices, or index or prices, of underlying securities. [ 1 Mark ]

(a) Both (A) and (B)
(b) Only A
(c) Only B
(d) Neither (A) nor (B).
(e) I am not attempting the question
Q37 Which among the following is the Business Recovery Strategy in BCP process? [ 1 Mark ]

(a) Back-Up Recovery
(b) Environment Failure Recovery
(c) Business Functions Recovery
(d) Facility Recovery
(e) I am not attempting the question
Q38 What is the most important biometric system characteristic? [ 1 Mark ]

(a) Acceptability of users
(b) Reliability
(c) Speed and throughput
(d) Enrollment Time
(e) I am not attempting the question
Q39 What does continuity of operations plan focus on? [ 1 Mark ]

(a) Outlining of roles and authorities, orders of succession, and individual role tasks.
(b) Focuses on how to recover various IT mechanisms after a disaster.
(c) Planning for systems, networks, and major applications recovery procedures after disruptions
(d) Establishing personnel safety and evacuation procedures.
(e) I am not attempting the question
Q40 Pertaining to IT Act what rules can central government make with respect of digital signature? [ 1 Mark ]

(a) The type of digital signature.
(b) The manner and format in which the digital signature shall be affixed.
(c) Any other matter which is necessary to give legal effect to digital signatures.
(d) All of the above.
(e) I am not attempting the question
Q41 What is the maximum number of depository accounts that can be opened by an investor? [ 1 Mark ]

(a) Only one account with a particular depository participant.
(b) One account only
(c) There is no restriction on the number of accounts an investor can open.
(d) It depends on his Net Worth.
(e) I am not attempting the question
Q42 In case of default in repayment to small depositors, intimation of such fact should be given within ________. [ 2 Marks ]

(a) one month from the date of default
(b) 60 days from the date of default
(c) 15 days from the date of default
(d) three months from the date of default
(e) I am not attempting the question
Q43 Exchange Traded Derivatives has been introduced in Indian Financial Market by ________. [ 1 Mark ]

(a) NSCCL
(b) RBI
(c) NSDL
(d) SEBI
(e) I am not attempting the question
Q44 __________ model enables the owner of the resource to specify what subjects can access specific Resources [ 1 Mark ]

(a) Role-based Access Control
(b) Sensitive Access Control
(c) Discretionary Access Control
(d) Mandatory Access Control
(e) I am not attempting the question
Q45 As per the SEBI (ESOS and ESPS) Guidelines 1999, _____________. [ 1 Mark ]

(a) an employee who is a promoter or belongs to the promoter group shall not be eligible to participate in the ESPS
(b) an employee who is promoter shall be eligible to participate in the ESPS
(c) an employee who belongs to the promoter group shall be eligible to participate in the ESPS
(d) None of the above
(e) I am not attempting the question
Q46 Principal officer as per the SEBI (Underwriters) Regulations, 1993 means _________. [ 1 Mark ]

(a) any person connected with the management of the firm where the firm has stated that he is the principal officer
(b) any person connected with the management of the firm upon whom the Board has served a notice of its intention to treat him as principal officer
(c) any person connected with the administration of the firm
(d) any person connected with the administration of the firm where the firm has stated that he is the principal officer
(e) I am not attempting the question
Q47 Which one among these is a access control device? [ 2 Marks ]

(a) NIC
(b) Mouse
(c) Scanner
(d) Smart Card
(e) I am not attempting the question
Q48 Which of the following is an issue with signature-based intrusion detection systems? [ 1 Mark ]

(a) Hackers can circumvent signature evaluations.
(b) Previously defined attack signatures often evolve making the signatures invalid.
(c) Signature databases must be augmented with inferential elements.
(d) Only previously identified attack signatures are detected.
(e) I am not attempting the question
Q49 Premium Margin is levied at _________ level [ 1 Mark ]

(a) clearing member
(b) broker
(c) trading member
(d) client
(e) I am not attempting the question
Q50 What does SEBI do? [ 1 Mark ]

(a) It facilitates a high level of control and in-depth monitoring of security markets.
(b) It enters into dealings in securities in which dealings are not permitted.
(c) It ensures that the integrity of the exchanged data is maintained at all times.
(d) It can frame or issue rules, regulations, directives, guidelines, and norms in respect of primary markets and secondary markets.
(e) I am not attempting the question
Q51 The Court shall take cognizance of the offence punishable under the Depository Act 1996 on complaint made by ___________. [ 1 Mark ]

(a) SEBI
(b) Central Government
(c) State Government
(d) Any of the above.
(e) I am not attempting the question
Q52 Who is responsible to make avoid, mitigate, or absorb risk decisions? [ 1 Mark ]

(a) Management
(b) Damage assessment team
(c) Planner
(d) Security Team
(e) I am not attempting the question
Q53 In Business Continuity Planning, RPO stands for ______________. [ 1 Mark ]

(a) Recovery Point Objective
(b) Random Position Objective
(c) Run Projection Outage
(d) Round Point Objection
(e) I am not attempting the question
Q54 What does disaster recovery plan focus on? [ 1 Mark ]

(a) Establishing personnel safety and evacuation procedures.
(b) Planning for systems, networks, and major applications recovery procedures after disruptions.
(c) Outlining of roles and authorities, orders of succession, and individual role tasks.
(d) Focuses on how to recover various IT mechanisms after a disaster.
(e) I am not attempting the question
Q55 In IT Act what does legal recognition of digital signatures pertains to? [ 1 Mark ]

(a) That information or any other matter shall be authenticated by affixing the signature.
(b) That information or any other matter shall be sent only by email.
(c) That information or any other matter shall be legally assigned.
(d) That data or any other matter shall contain signature.
(e) I am not attempting the question
Q56 A firewall located between the Internet and your organization's private network is called a __________. [ 1 Mark ]

(a) Departmental LAN firewall
(b) VPN gateway
(c) Proxy
(d) Network perimeter firewall
(e) I am not attempting the question
Q57 Profit and Loss account of a company shows __________. [ 1 Mark ]

(a) the revenues and expenses during particular period of time
(b) the revenues and expenses of the company at a particular point of time
(c) the financial position of the company at a particular point of time
(d) None of the above.
(e) I am not attempting the question
Q58 The information about the transfer of securities in the name of the beneficial owners has to be furnished _________. [ 1 Mark ]

(a) by the beneficial owner to the depository
(b) by the issuer to the depository
(c) by the depository to the beneficial owner
(d) by the depository to the issuer
(e) I am not attempting the question
Q59 Which of the following is FALSE about the NEAT system? [ 1 Mark ]

(a) The identity of the trading member is revealed to make the system transparent.
(b) This system enables members from across the country to trade simultaneously with enormous ease and efficiency
(c) A member punches into the computer questions[antities of securities and the price at which he wants to transact.
(d) The transaction is executed through the mainframe computer of the exchange as soon as the order punched by the user finds a matching sale or buy order from a counter party.
(e) I am not attempting the question
Q60 Name the team/s that should be properly trained and available if a disaster hits? [ 2 Marks ]

(a) Relocation team
(b) Legal team
(c) Security team
(d) All of the above.
(e) I am not attempting the question
Q61 Which access control model is also called non-discretionary access control? [ 2 Marks ]

(a) Role-based access control
(b) Mandatory access control
(c) Rule-based access control
(d) Label-based access control
(e) I am not attempting the question
Q62 The goal of business continuity and disaster recovery is to __________. [ 1 Mark ]

(a) mitigate business impact
(b) mitigate operational impact
(c) mitigate financial impact
(d) All of the above.
(e) I am not attempting the question
Q63 Which access control technice restricts information based on the authorization granted to a particular user? [ 2 Marks ]

(a) DAC
(b) RBAC
(c) MAC
(d) Biba
(e) I am not attempting the question
Q64 SEBI administers the provisions of the Companies Act, 1956 in respect of __________. [ 1 Mark ]

(a) inter corporate loans and investments
(b) holding of the annual general meeting
(c) issue and transfer of securities and non-payment of dividend
(d) acceptance of deposits
(e) I am not attempting the question
Q65 Which of the following are the two most well known access control models? [ 2 Marks ]

(a) Bell LaPadula and Biba
(b) Bell LaPadula and Chinese war
(c) Lattice and Biba
(d) Bell LaPadula and Info Flow
(e) I am not attempting the question
Q66 Which of the following is not a SSO access approach? [ 1 Mark ]

(a) The clients
(b) Kerberos
(c) Discretionary
(d) Scripts
(e) I am not attempting the question
Q67 Which of the following is not an advantage of a hot site? [ 1 Mark ]

(a) Offers many hardware and software choices.
(b) Is readily available.
(c) Annual testing is available.
(d) Can be up and running in hours.
(e) I am not attempting the question
Q68 With respect to Copyright, what is adaptation? [ 1 Mark ]

(a) The preparation of a new work in the same or different form based upon an already existing work.
(b) A member of copyright board getting familiar to his new role.
(c) The migration procedure of registrar and chairman of copyright board.
(d) None of the above
(e) I am not attempting the question
Q69 _________ is a sequence of characters that is usually longer than the allotted number for a password. [ 1 Mark ]

(a) Passphrase
(b) Anticipated phrase
(c) Real phrase
(d) Congnitive phrase
(e) I am not attempting the questions
Q70 What does authentication mean? [ 1 Mark ]

(a) Validating a user
(b) Registering a user
(c) Identifying a user
(d) Authorizing a user
(e) I am not attempting the question
Q71 Any bank encountering security breaches or failure of security system's should ________. [ 1 Mark ]

(a) report to Reserve Bank of India
(b) close all its online transaction's
(c) assign the recovery process to third party
(d) inform all its branches
(e) I am not attempting the question
Q72 A client/server, single sign-on is a session/user authentication where in ______. [ 1 Mark ]

(a) permits a user to enter many usernames and password in order to access multiple applications
(b) permits a user to enter one username and password in order to access multiple applications
(c) permits a user to enter many usernames and password in order to access single application
(d) permits a user to enter one username and password in order to access single application
(e) I am not attempting the question
Q73 After identifying risks to the critical business functions the planners do which of the following? [ 1 Mark ]

(a) Absorb Risk
(b) Avoid Risk
(c) Mitigate Risk
(d) All of the above.
(e) I am not attempting the question
Q74 As per the listing agreement, the Chairman of which Committees should be present at the Annual General meetings of the company? [ 1 Mark ]

(a) Remuneration Committee
(b) Only Audit Committee
(c) Shareholders Grievance Committee
(d) Audit Committee and Remuneration Committee
(e) I am not attempting the question
Q75 Consider the following scenario: A person builds a house on an ocean beach. A storm washes away the beach. The house collapses. Disaster recovery would suggest that ___________. [ 1 Mark ]

(a) rebuild the house in time for the next storm
(b) building a barrier reef or moving the house farther inland
(c) a storm will come ashore and damage the house
(d) make sure there is someplace to live while the house is rebuilt
(e) I am not attempting the question
Q76 In discretionary access control security, who has delegation authority to grant access to data? [ 1 Mark ]

(a) Owner
(b) User
(c) Security office
(d) Security policy
(e) I am not attempting the question
Q77 In IT Act what is of utmost importance? [ 1 Mark ]

(a)Reliable communication
(b)Secure transmission
(c)High degree of availability
(d)Use of digital certificates
(e)I am not attempting the question
Q78 Which of the following describes a cold site? [ 1 Mark ]

(a)Fully equipped and operational in a few hours.
(b)Partially equipped with data processing equipment.
(c)Provides environmental measures but no equipment.
(d)Expensive and fully configured.
(e)I am not attempting the question
Q79 All members of the audit committee shall be _________ literate [ 1 Mark ]

(a)financially
(b)educationally
(c)technologically
(d)All of the above
(e)I am not attempting the question
Q80 The SEBI Committee on derivatives has recommended that the exposure limits for brokers should be linked to the __________. [ 1 Mark ]

(a)deposits kept by the broker with the Exchange/Clearing corporation
(b)satisfactory margin payment track record of the broker
(c)networth of the broker
(d)daily turnover of the broker
(e)I am not attempting the question
Q81 What is the reason for enforcing the separation of duties? [ 1 Mark ]

(a)It induces an atmosphere for collusion.
(b)It increases dependence on individuals.
(c)No one person can complete all the steps of a critical activity.
(d)It makes critical tasks easier to accomplish.
(e)I am not attempting the question
Q82 Which instrument among these is considered the most challenging and rewarding investment option, when compared to other investment options? [ 1 Mark ]

(a)Treasury Bill
(b)Equity
(c)Bonds
(d)Fixed Deposit
(e)I am not attempting the question
Q83 Every recognised stock exchange shall furnish copy of Annual Report to _______. [ 1 Mark ]

(a)State Government
(b)SEBI
(c)Central Government
(d)SEBI and Central Government
(e)I am not attempting the question
Q84 In MAC, what is Labeling at finer granularity? [ 1 Mark ]

(a)Individual attributes of each row is labeled.
(b)Individual row of each relation is labeled.
(c)Individual column of each relation is labeled.
(d)Individual field of each column is labeled.
(e)I am not attempting the question
Q85 Firewall helps detection of virus or malicious intrusion in __________. [ 1 Mark ]

(a)Real time
(b)Logging
(c)No alert just deny the attacker
(d)All of above.
(e)I am not attempting the question
Q86 Of all business process interruptions, the most devastating are ones resulting from ________. [ 1 Mark ]

(a)loss of applications
(b)loss of data
(c)loss of hardware/software
(d)loss of communication links
(e)I am not attempting the question
Q87 During development, testing, and maintenance of the continuity plan, a high degree of interaction and communications is crucial to the process. Why? [ 2 Marks ]

(a)This is a regulatory requirement of the process.
(b)This is not crucial to the plan and should not be interactive because it will most likely affect operations.
(c)The more people that talk about it and are involved, the more awareness will increase.
(d)Management will more likely support it.
(e)I am not attempting the question
Q88 Primarily IT Act wants digital certificates to ______________. [ 1 Mark ]

(a)uniquely identify a subscriber
(b)uniquely identify a certification authority
(c)uniquely identify a digital signature
(d)All of the above
(e)I am not attempting the question
Q89 Users might have different usernames and passwords, sometimes to remember all of that is very difficult for purpose of e-commerce. Which solution is the best for this kind of scenario? [ 1 Mark ]

(a)Smart Card
(b)Single sign-on
(c)PDA
(d)Kerberos
(e)I am not attempting the question
Q90 The audit committee of the holding company shall review the investments made by ________ [ 1 Mark ]

(a) unlisted subsidiary companies
(b) material subsidiary companies
(c) subsidiary companies
(d) listed subsidiary companies
(e) I am not attempting the question

NCFM MODEL TEST PAPER
Information Security Auditors Module - (Part 2)

Maximum Marks: 100 Pass Marks: 60
Test Duration: 120 minutes Time Left:119:54 minutes

Q1 The security functionality defines the expected activities of a security mechanism, and assurance defines __________. [ 1 Mark ]

(a) the confidence of the security the mechanism is providing
(b) cost/benefit relationship
(c) the data classification after the security mechanism has been implemented
(d) the controls the security mechanism will enforce
(e) I am not attempting the question
Q2 A cipher lock uses a keypad and is ___________. [ 1 Mark ]

(a) Expensive
(b) Programmable
(c) Reliable
(d) Portable
(e) I am not attempting the question
Q3 What is vulnerability? [ 1 Mark ]

(a) Can be leaky policy.
(b) A security hole
(c) An accessing data.
(d) A weakness that could be exploited.
(e) I am not attempting the question
Q4 __________ are objects, in form of credit cards, size memory cards or smart cards, or those resembling small calculators, that are used to supply static and dynamic passwords. [ 1 Mark ]

(a) Tokens
(b) Token passing network
(c) Coupons
(d) Token ring
(e) I am not attempting the question
Q5 What will be Annualized Rate of Occurrence (ARO) of the treat 'user input error', in the case that company employs 100 data entry clerks and every one of them make one input error each month? [ 1 Mark ]

(a) 1200
(b) 120
(c) 1
(d) 100
(e) I am not attempting the question
Q6 What is the formula for total risk? [ 1 Mark ]

(a) {(Threats X Vulnerability ) + asset value}
(b) (Threats X Vulnerability X asset value)
(c) Threats + vulnerability - asset value) X controls gap
(d) (Threats X vulnerability X asset value) X controls gap
(e) I am not attempting the question
Q7 What is true about a transponder? [ 1 Mark ]

(a) It is a passive proximity device.
(b) It is a card that a user swipes through a card reader to gain access to a facility.
(c) It is a card that can be read without sliding it through a card reader.
(d) It exchanges tokens with an authentication server.
(e) I am not attempting the question
Q8 Which type of encryption would be considered the more secured encryption method across a single link? [ 1 Mark ]

(a) Link encryption
(b) Transport encryption
(c) End-to-end encryption
(d) Tunnel encryption
(e) I am not attempting the question
Q9 Although the words 'Threat' , 'Vulnerability', 'risk' and 'exposure' sounds similar which one best describes the probability of threat materializing? [ 1 Mark ]

(a) Risk
(b) Threat Agent
(c) Vulnerability
(d) Exposure
(e) I am not attempting the question
Q10 Which one does not fall in Risk Assessment activity? [ 1 Mark ]

(a) Treatment options
(b) Reduction and Acceptance
(c) Selection of security controls and risk
(d) None of the above.
(e) I am not attempting the question
Q11 Which of the following would not be considered an operations media control task? [ 2 Marks ]

(a) Compressing and decompressing storage materials.
(b) Controlling access to media and logging activities.
(c) Storing backup information in a protected area.
(d) Erasing data when its retention period is over.
(e) I am not attempting the question
Q12 In business company's terms what is the other word for intellectual data? [ 1 Mark ]

(a) Forecast information
(b) Information data
(c) Company profile
(d) Procedure
(e) I am not attempting the question
Q13 In portable computer environment, what kind of attacks are common to compromise data integrity? [ 1 Mark ]

(a) Phishing
(b) Virus attacks
(c) Terrorist attacks
(d) Physical alteration of data
(e) I am not attempting the questions
Q14 What is an advantage of content-dependent access control in databases? [ 1 Mark ]

(a) Ensures concurrency
(b) Disallows data locking
(c) Processing overhead
(d) Granular control
(e) I am not attempting the question
Q15 In finger scan biometric, what is the average processing time? [ 1 Mark ]

(a) 8 seconds
(b) 7 seconds
(c) 2 - 3 seconds
(d) 10 seconds
(e) I am not attempting the question
Q16 Which best describes a quantitative risk analysis? [ 1 Mark ]

(a) A method that assigns monetary values to components in the risk assessment.
(b) A method that is based on gut feelings and opinions.
(c) Scenario-based analysis to research different security threats.
(d) A method used to apply severity levels to potential loss, probability of loss and risks.
(e) I am not attempting the question
Q17 _________ type of lock uses programmable keypads to restrict access [ 2 Marks ]

(a) Cipher
(b) Preset
(c) Device
(d) Complex
(e) I am not attempting the question
Q18 Among the following what is a disadvantage of intrusion detection system? [ 1 Mark ]

(a) Are expensive to install
(b) Can be penetrated
(c) Are subject to false alarms
(d) All of the above.
(e) I am not attempting the question
Q19 Recommendations and general approaches that provide advice and flexibility are called as ________. [ 1 Mark ]

(a) Procedure
(b) Guideline
(c) Standard
(d) Policy
(e) I am not attempting the question
Q20 You take a fire insurance policy and give the risk for fire to an insurance company, what kind of risk management technique is this? [ 1 Mark ]

(a) Transfer the risk.
(b) Risk reduction
(c) Acceptance of risk
(d) Avoidance of risk
(e) I am not attempting this question
Q21 On what are risk reduction technique based? [ 1 Mark ]

(a) The costs of mitigating actions that could be taken.
(b) The costs of potential losses.
(c) The likelihood that a damaging event will occur.
(d) All of the above.
(e) I am not attempting this question
Q22 What does SSL do? [ 1 Mark ]

(a) It encrypts the communication between the browser and the web server.
(b) It encrypts the communication between the browser and client.
(c) It authenticates the browser to the web server.
(d) None of the above
(e) I am not attempting this question
Q23 The PRIMARY purpose of operations security is to ________. [ 1 Mark ]

(a) establish thresholds for violation detection and logging
(b) monitor the actions of vendor service personnel
(c) protect the system hardware from environment damage
(d) safeguard information assets that are resident in the system
(e) I am not attempting this question
Q24 Which of the following centrally controls the database and manages different aspects of the data? [ 1 Mark ]

(a) Database
(b) Access control
(c) Data dictionary
(d) Data storage
(e) I am not attempting this question
Q25 Who is ultimately responsible for making sure data is classified and protected? [ 1 Mark ]

(a) Users
(b) Management
(c) Administration
(d) Security analyst
(e) I am not attempting this question
Q26 Inventories are used for maintaining company's ________. [ 2 Marks ]

(a) software assets
(b) paper assets
(c) physical assets
(d) All of the above.
(e) I am not attempting this question
Q27 _______ procedures cover the firewalls, routers, switches and operating systems. [ 1 Mark ]

(a) Administrative
(b) Incident response
(c) Auditing
(d) Configuration
(e) I am not attempting this question
Q28 How does proximity detector intrusion systems work? [ 1 Mark ]

(a) By detecting any sound that is made during a forced entry.
(b) By detecting a change or break in a circuit.
(c) By monitoring the magnetic field which it produces.
(d) By detecting the change in a light beam.
(e) I am not attempting this question
Q29 Which option relates to views? [ 1 Mark ]

(a) Allow the data base to be conceptually divided into pieces.
(b) Allow users to selectively and dynamically grant privileges to other users.
(c) Allows a user access to an object dynamically.
(d) None of the above
(e) I am not attempting this question
Q30 What is shared information? [ 1 Mark ]

(a) Publicly accessible
(b) Restricted to a specific list of people
(c) Your internal employees only
(d) Shared within groups
(e) I am not attempting this question
Q31 Who should measure the effectiveness of security related controls in an organization? [ 1 Mark ]

(a) The local security specialist
(b) The central security manager
(c) The business manager
(d) The system auditor
(e) I am not attempting this question
Q32 Most computer attacks result in violation of which of the following security properties? [ 1 Mark ]

(a) Availability
(b) Confidentiality
(c) Integrity and control
(d) All of the above.
(e) I am not attempting this question
Q33 What is the most critical characteristic of a biometric identifying system? [ 1 Mark ]

(a) Storage requirements
(b) Accuracy
(c) Reliability
(d) Perceived intrusiveness
(e) I am not attempting this question
Q34 Any compromise in a security policy could lead to ___________. [ 1 Mark ]

(a) hamper the company's work flow
(b) increase in company's turnover
(c) rejection of company's security certification
(d) company's loss of sensitive information
(e) I am not attempting this question
Q35 A security policy does not contain _________. [ 1 Mark ]

(a) the implementation process of the security
(b) the statement of words which concerns security
(c) the security goal to be achieved
(d) the awareness of security for employees
(e) I am not attempting this question
Q36What is a protocol? [ 1 Mark ]

(a) A set of rules that dictates how computers exchange a service over networks.
(b) A set of rules that dictates how computers communicate over networks.
(c) It is a de facto standard for transmitting data across the internet.
(d) It is the major component of the ping utility.
(e) I am not attempting this question
Q37 Buffer overflow and boundary condition errors are subsets of _________. [ 1 Mark ]

(a) exceptional condition handling errors
(b) access validation errors
(c) race condition errors
(d) input validation errors
(e) I am not attempting this question
Q38 Why should employers make sure employees take their vacations? [ 1 Mark ]

(a) It is a way that fraud can be uncovered.
(b) To ensure that the employee does not get burnt out.
(c) They have a legal obligation.
(d) It is part of due diligence
(e) I am not attempting this question
Q39 What is a short coming of a firewall? [ 1 Mark ]

(a) They do not help to detect if an intrusion occurred and they can also be bypassed.
(b) They are not easily upgradeable.
(c) They are very costly to implement.
(d) They slow down the overall performance of the network.
(e) I am not attempting this question
Q40 Which of the following items is not considered a preventive physical control? [ 1 Mark ]

(a) Security dogs
(b) Security guard
(c) Access log
(d) Fencing
(e) I am not attempting this question
Q41 Which of the following fire suppressing agents should not be used in an operations center containing employees? [ 1 Mark ]

(a) Water
(b) Gas
(c) Soda acid
(d) CO2
(e) I am not attempting this question
Q42 What takes place at the session layer? [ 1 Mark ]

(a) Packet sequencing
(b) Routing
(c) Addressing
(d) Dialog control
(e) I am not attempting this question
Q43 How is single loss expectancy (SLE) calculated? [ 1 Mark ]

(a) Annualized rate of occurrence (ARO) X exposure factor
(b) Asset value X exposure factor
(c) Annualized rate of occurrence (ARO) X asset value
(d) Asset value X asset loss expectancy (ALE)
(e) I am not attempting this question
Q44 A prolonged power supply that is below normal voltage is a _______. [ 1 Mark ]

(a) brownout
(b) surge
(c) blackout
(d) fault
(e) I am not attempting this question
Q45 ____________ is the means by which the ability to do something with a computer resource is explicitly enabled or restricted. [ 1 Mark ]

(a) System Resources
(b) Accesses Control
(c) Type Of Accesses
(d) Work Permit
(e) I am not attempting this question
Q46If an access control has a fail-safe characteristic but not a fail-secure characteristic, what does that mean? [ 2 Marks ]

(a) It defaults to being locked.
(b) It defaults to sounding a remote alarm instead of a local alarm.
(c) It defaults to no access.
(d) It defaults to being unlocked.
(e) I am not attempting this question
Q47 A deviation from an organization-wide security policy requires which of the following? [ 1 Mark ]

(a) Risk containment
(b) Risk reduction
(c) Risk assignment
(d) Risk acceptance
(e) I am not attempting this question
Q48 What do you think the application should do when it fails? [ 1 Mark ]

(a) It should stop and mark as bad application.
(b) It should go directly to a secure state.
(c) It should be still active, so to track the attacker when he jumps in and uses it.
(d) It should stop and restart automatically.
(e) I am not attempting this question
Q49 SYN flood attack is what kind of attack? [ 1 Mark ]

(a) Dictionary attack
(b) Brute force attack
(c) Heart attack
(d) Denial of service attack
(e) I am not attempting this question
Q50 The preliminary steps to security planning include all of the following EXCEPT _________. [ 1 Mark ]

(a) establish objectives
(b) establish a security audit function
(c) list planning assumptions
(d) determine alternate courses of action
(e) I am not attempting this question
Q51 What is the disadvantage of risk assessment technique? [ 1 Mark ]

(a) It takes a considerable amount of time.
(b) It takes lots of man power.
(c) It is expensive
(d) It disrupts the work flow of the company.
(e) I am not attempting this question
Q52 Which of the following is NOT a system-sensing wireless proximity card? [ 2 Marks ]

(a) Passive device
(b) Field-powered device
(c) Transponder
(d) Magnetically striped card
(e) I am not attempting this question
Q53 In client browser and sever communication, data is passed in form of _______ [ 1 Mark ]

(a) Cookies
(b) Viruses
(c) Applets
(d) ActiveX
(e) I am not attempting this question
Q54 Why is user education helpful for portable computing? [ 1 Mark ]

(a) To make the users aware of the threats to company shared resources.
(b) To train the users so as to make them more efficient while using company's resources.
(c) To provide users with remote and mobile computing education.
(d) To train users before allowing them to access these portable computers.
(e) I am not attempting this question
Q55 How do you explain Risk Management? [ 1 Mark ]

(a) The process which involves identifying, controlling and eliminating the security risks.
(b) The process which involves implementing, developing and mitigating security risks.
(c) The process which involves isolating, combining and eliminating the security risks.
(d) None of above
(e) I am not attempting this question
Q56 What do incident logs provide? [ 1 Mark ]

(a) A good insight into the vulnerabilities of a system.
(b) Throw new challenges to the security professionals.
(c) List of assets and their owners.
(d) Location of the assets.
(e) I am not attempting this question
Q57 Signs, lighting, environmental design are employed for what kind of control? [ 1 Mark ]

(a) preventive
(b) access
(c) deterrent
(d) administrative
(e) I am not attempting this question
Q58 The business processes can be affected by __________. [ 1 Mark ]

(a) disgruntled employees
(b) industrial espionage
(c) hackers
(d) all of the above
(e) I am not attempting the question
Q59 How do we better understand policy? [ 1 Mark ]

(a) It is a statement of the goals to be achieved by procedures.
(b) It is a statement of the goals to be achieved by guidelines.
(c) It is a statement of the goals to be achieved by baselines.
(d) It is a statement of the goals to be achieved by standards
(e) I am not attempting the question
Q60 Which of the following protocols is considered connection oriented? [ 2 Marks ]

(a) IP
(b) TCP
(c) ICMP
(d) UDP
(e) I am not attempting the question
Q61 What is the best description of CHAP (Challenge Handshake Authentication Protocol)? [ 1 Mark ]

(a) Password not sent in clear text.
(b) It is substandard to PAP.
(c) Passwords are sent in clear text.
(d) Passwords are not used, a digital signature is used.
(e) I am not attempting the question
Q62 In this information age, which is the most vulnerable asset of an organization? [ 1 Mark ]

(a) Employees
(b) Data
(c) Machinery
(d) Finance
(e) I am not attempting the question
Q63 What kind of device requires user to supply user Id plus password plus token and something more? [ 2 Marks ]

(a) Biometric
(b) Smart cards
(c) Dumb cards
(d) Challenge-response token
(e) I am not attempting the questions
Q64 Which of the following is not a purpose of doing a risk analysis? [ 1 Mark ]

(a) Define the balance between the impact of a risk and the cost of the necessary counter measure
(b) Identify risks
(c) Delegate responsibility
(d) Quantify impact of potential threats
(e) I am not attempting the question
Q65 Which one of the following individuals has PRIMARY responsibility for determining the classification level of information? [ 1 Mark ]

(a) Security manager
(b) Owner
(c) User
(d) Auditor
(e) I am not attempting the question
Q66 When security is a high priority, why is fiber cabling used? [ 1 Mark ]

(a) It has high data transfer rates and is less vulnerable to EMI
(b) It multiplexes data, which can confuse attackers.
(c) Data interception is very difficult.
(d) It has a high degree of data detection and correction.
(e) I am not attempting the question
Q67 Which of this is a best definition for socket? [ 1 Mark ]

(a) An IP address and MAC address
(b) A session layer link.
(c) An IP address and port number.
(d) MAC address and port number.
(e) I am not attempting the question
Q68 Devices that supply power when the commercial utility power system fails are called ________. [ 2 Marks ]

(a) uninterruptible power supplies
(b) power conditioners
(c) power filters
(d) power dividers
(e) I am not attempting the question
Q69 What attack is typically used for identifying the topology of the target network? [ 1 Mark ]

(a) Assessing
(b) Scanning
(c) Printing
(d) Porting
(e) I am not attempting this question
Q70 Under MAC, a clearance is a ______________. [ 1 Mark ]

(a) subject
(b) sensitivity
(c) privilege
(d) object
(e) I am not attempting this question
Q71 Policies are not written to affect ____________. [ 1 Mark ]

(a) software access
(b) hardware
(c) outside entities
(d) networks
(e) I am not attempting this questions
Q72 Qualitative risk analysis _____________. [ 2 Marks ]

(a) focuses on the costs of potential losses
(b) aims to analyze numerically the probability of each risk
(c) uses judgment and intuition instead of numbers
(d) focuses on the costs of mitigating
(e) I am not attempting this questions
Q73 In proximity identification system what do you understand by the term 'user activated'? [ 1 Mark ]

(a) User and system are independent of activation.
(b) System is activated mutually by the user and system.
(c) Action needs to be taken by the system.
(d) Action needs to be taken by a user
(e) I am not attempting this questions
Q74 Which of the following best describes a characteristic of IPsec? [ 1 Mark ]

(a) Provides content filtering
(b) Works as a proxy.
(c) Provides application layer protection.
(d) Provides system authentication.
(e) I am not attempting this question
Q75 UDP provides __________ delivery. [ 1 Mark ]

(a) distributed
(b) connection-oriented
(c) best-efficiency
(d) best effort
(e) I am not attempting this question
Q76 What is BS ISO/IEC 27001? [ 1 Mark ]

(a) Standard that provides a framework for computer to computer communication
(b) Standard that provides a specification for handling various controls in BCP
(c) International standard that provides a specification for security infrastructure
(d) New international standard that provides a specification for ISMS and the foundation for third-party audit and certification
(e) I am not attempting this question
Q77 Database views provide what type of security control? [ 1 Mark ]

(a) Administrative
(b) Corrective
(c) Detective
(d) Preventive
(e) I am not attempting this question
Q78 How does data encapsulation and the protocol stack work? [ 1 Mark ]

(a) Each protocol or service at each layer in the OSI model adds its own information to the data as it is passed down the protocol stack
(b) The packet is encapsulated and grows when it is passed up the protocol stack
(c) Each protocol or service at each layer in the OSI model multiplexes other packets to the data as it is passed down the protocol stack
(d) The packet is encapsulated and grows as it hops from router to router
(e) I am not attempting this question
Q79 Which software development model is actually a Meta model that incorporates a number of software development models? [ 1 Mark ]

(a) The Critical Path Model
(b) The modified Waterfall Model
(c) The Waterfall Model
(d) The Spiral Model
(e) I am not attempting this question
Q80 ___________ best suits for theft protection on portable computers. [ 2 Marks ]

(a) Store all the data in password protected drives on portable computer
(b) Remove power supply batteries from the computer when in non-operational mode
(c) Should have a logon before gaining access to the resources
(d) Allow the computer to continue running when unattended
(e) I am not attempting this question
Q81 Before writing a security policy what concerns the security analyst? [ 1 Mark ]

(a) How large is the organization's infrastructure
(b) What is the annual turnover or revenues of an organization
(c) Which systems and processes are important to the company's mission
(d) The total number of employees working in an organization.
(e) I am not attempting this question
Q82 Which of the following is an administrative control for physical security? [ 1 Mark ]

(a) Lighting
(b) Fences
(c) Facility construction material
(d) Training
(e) I am not attempting this question
Q83 A system file that has been patched numerous times becomes infected with a virus. The anti-virus software warns that disinfecting the file may damage it. What course of action should be taken? [ 1 Mark ]

(a) Replace the file with the original version from master media.
(b) Proceed with automated disinfections
(c) Research the virus to see if it is benign
(d) Restore an uninfected version of the patched file from backup media
(e) I am not attempting this question
Q84 A risk assessment approach must fulfill which criteria? [ 1 Mark ]

(a) Identifying the impacts of losses of confidentiality, integrity and availability might have on the assets.
(b) Identifying the threats and vulnerabilities, and any other applicable security requirements.
(c) Identify the assets and owners of these assets.
(d) All of the above
(e) I am not attempting this question
Q85 Which of the following best allows risk management results to be used knowledgeably? [ 1 Mark ]

(a) A likelihood assessment
(b) An uncertainty analysis
(c) A threat identification
(d) A vulnerability analysis
(e) I am not attempting this question
Q86 Which of the following is currently the most recommended water system for a computer room? [ 1 Mark ]

(a) Deluge
(b) Preaction
(c) Dry pipe
(d) Wet pipe
(e) I am not attempting this question
Q87 Which type of control is concerned with avoiding occurrences of risks? [ 1 Mark ]

(a) Preventive controls
(b) Detective controls
(c) Deterrent controls
(d) Compensating controls
(e) I am not attempting this question
Q88 Which among these is a risk assessing technique? [ 1 Mark ]

(a) Compound
(b) Aggregate
(c) Monetary
(d) Basic
(e) I am not attempting this question
Q89 Which of the following is the backdoor to an application created by a developer? [ 1 Mark ]

(a) Trap Door
(b) Easter egg
(c) Trojan Horse
(d) Loop Hole
(e) I am not attempting this question
Q90 The estimated life time of a device or the estimated timeframe until a component within a device gives out is called ___________. [ 1 Mark ]

(a) MTBF
(b) MTTR
(c) UPS
(d) MTTB
(e) I am not attempting this question.

No comments: