| Q 1: |
A Software Requirements Specification (SRS) document should avoid discussing which one of the following? |
| (1) | Non-functional requirements |
| (2) | User interface issues |
| (3) | Design specification |
| (4) | Interfaces with third party software |
| Correct Answer: Design specification | |
| Q 2: | Software risk always involves two characteristics |
| (1) | Fire fighting and crisis management |
| (2) | Known and unknown risks |
| (3) | Uncertainty and loss |
| (4) | Staffing and budget |
| Correct Answer: Uncertainty and loss | |
| Q 3: | ................is a digital version of AMPS |
| (1) | GSM |
| (2) | D-AMPS |
| (3) | IS-95 |
| (4) | None of the above |
| Correct Answer: D-AMPS | |
| Q 4: |
In a time-domain plot, the horizontal axis is a measure of............. |
| (1) | signal amplitude |
| (2) | frequency |
| (3) | phase |
| (4) | time |
| Correct Answer: time | |
| Q 5: | Optimal Asymmetric Encryption Padding is employed in RSA to counter |
| (1) | Known Ciphertext Attack |
| (2) | Chosen Ciphertext Attack |
| (3) | Known Plaintext Attack |
| (4) | Chosen Plaintext Attack |
| Correct Answer: Chosen Ciphertext Attack | |
| Q 6: | What is the correct ordering of attacks on the basis of difficulty level (High to low) |
| (1) | known plaintext, chosen plaintext, chosen ciphertext, ciphertext only |
| (2) | known plaintext, chosen ciphertext, chosen plaintext, ciphertext only |
| (3) | ciphertext only, known plaintext, chosen plaintext, chosen ciphertext |
| (4) | ciphertext only, chosen plaintext, known plaintext, chosen ciphertext |
| Correct Answer: ciphertext only, known plaintext, chosen plaintext, chosen ciphertext | |
| Q 7: | Which of the following denote page code model in ASP.NET? |
| (1) | single-file |
| (2) | code-behind |
| (3) | Both 1 and 2 |
| (4) | None of the above |
| Correct Answer: Both 1 and 2 | |
| Q 8: |
The ISO quality assurance standard that applies to software engineering is |
| (1) | ISO 9000:2004 |
| (2) | ISO 9001:2000 |
| (3) | 150 9002 2001 |
| (4) | ISO 9003 2004 |
| Correct Answer: ISO 9001:2000 | |
| Q 9: |
A type of cybercrime that occurs in pay per click online advertising when a person, automated script or computer program imitates a legitimate user of a web browser clicking on an ad, for the purpose of generating charge per click without having actual interest in the targets of the ad's link |
| (1) | Phishing |
| (2) | Zombie |
| (3) | Click fraud |
| (4) | None of the above |
| Correct Answer: Click fraud | |
| Q 10: |
A review summary report answers which three questions? |
| (1) | Terminate project, replace producer, request a time extension |
| (2) | What defects were found, what caused defects, who was responsible |
| (3) | What was reviewed, who reviewed it, what were the findings |
| (4) | None of the above |
| Correct Answer: What was reviewed, who reviewed it, what were the findings | |