Q 1: |
A Software Requirements Specification (SRS) document should avoid discussing which one of the following? |
(1) | Non-functional requirements |
(2) | User interface issues |
(3) | Design specification |
(4) | Interfaces with third party software |
Correct Answer: Design specification | |
Q 2: | Software risk always involves two characteristics |
(1) | Fire fighting and crisis management |
(2) | Known and unknown risks |
(3) | Uncertainty and loss |
(4) | Staffing and budget |
Correct Answer: Uncertainty and loss | |
Q 3: | ................is a digital version of AMPS |
(1) | GSM |
(2) | D-AMPS |
(3) | IS-95 |
(4) | None of the above |
Correct Answer: D-AMPS | |
Q 4: |
In a time-domain plot, the horizontal axis is a measure of............. |
(1) | signal amplitude |
(2) | frequency |
(3) | phase |
(4) | time |
Correct Answer: time | |
Q 5: | Optimal Asymmetric Encryption Padding is employed in RSA to counter |
(1) | Known Ciphertext Attack |
(2) | Chosen Ciphertext Attack |
(3) | Known Plaintext Attack |
(4) | Chosen Plaintext Attack |
Correct Answer: Chosen Ciphertext Attack | |
Q 6: | What is the correct ordering of attacks on the basis of difficulty level (High to low) |
(1) | known plaintext, chosen plaintext, chosen ciphertext, ciphertext only |
(2) | known plaintext, chosen ciphertext, chosen plaintext, ciphertext only |
(3) | ciphertext only, known plaintext, chosen plaintext, chosen ciphertext |
(4) | ciphertext only, chosen plaintext, known plaintext, chosen ciphertext |
Correct Answer: ciphertext only, known plaintext, chosen plaintext, chosen ciphertext | |
Q 7: | Which of the following denote page code model in ASP.NET? |
(1) | single-file |
(2) | code-behind |
(3) | Both 1 and 2 |
(4) | None of the above |
Correct Answer: Both 1 and 2 | |
Q 8: |
The ISO quality assurance standard that applies to software engineering is |
(1) | ISO 9000:2004 |
(2) | ISO 9001:2000 |
(3) | 150 9002 2001 |
(4) | ISO 9003 2004 |
Correct Answer: ISO 9001:2000 | |
Q 9: |
A type of cybercrime that occurs in pay per click online advertising when a person, automated script or computer program imitates a legitimate user of a web browser clicking on an ad, for the purpose of generating charge per click without having actual interest in the targets of the ad's link |
(1) | Phishing |
(2) | Zombie |
(3) | Click fraud |
(4) | None of the above |
Correct Answer: Click fraud | |
Q 10: |
A review summary report answers which three questions? |
(1) | Terminate project, replace producer, request a time extension |
(2) | What defects were found, what caused defects, who was responsible |
(3) | What was reviewed, who reviewed it, what were the findings |
(4) | None of the above |
Correct Answer: What was reviewed, who reviewed it, what were the findings | |