NOUN TMA Solutions: CSS241 - Basic Security and Security threats

Use past TMAs to deal with new TMAs and Exams
Jed
Posts: 993
Joined: Tue Oct 10, 2017 6:37 pm
Contact:

NOUN TMA Solutions: CSS241 - Basic Security and Security threats

Postby Jed » Wed Aug 01, 2018 4:41 pm

Solutions2tma@gmail.com
Whatsapp: 08155572788

Stay informed when you download our app
https://play.google.com/store/apps/deta ... m.nounites


Q1 Spies who gather information are known as -----

Agents

Q2 What is the use of technologies to measure and study the physical and behavioral features of person(s) for the purpose of authentication, identification or screening

Biometric Surveillance

Q3 The Nigeria Police is bedeviled in its operations with the problem of ineffective ----- analysis

intelligence

Q4 ethnicity often creates the problem of identity and (enemy) ----- in the minds of people

imaging

Q5 An analyst needs to demonstrate at least a minimum degree of ----- with some other team players in the field

partnering

Q6 Other sources of data collection are communication interception and -----

satellite

Q7 Hypotheses are statements, which are developed to ----- the relationship between two variables

predict

Q8 The most crucial stage of intelligence analysis is to -----

Evaluate Hypotheses

Q9 What is the general belief that two heads are better than one?

Peer Review

Q10 In the United States, the ----- appears to be the major counter-intelligence agency in the country

Federal Bureau for Investigation (FBI)

Q11 An inddependent secuirty organization that has no police powers but is mandated by the law to have a good or collaborative working relation with the law enforcement agency is known as the

􀳦??Special Branch􀳦?􀳦

Q12 Where the hostile agents are diplomats, the friendly nation or host country declares them ----- and facilitate their immediate repatriation

persona non grata

Q13 Offensive ----- Operations include all activities that are targeted towards arresting the mischief of the enemy-parties

Counter inte lligence

Q14 What underscores the relevance of information that is very crucial to the future operations of any organization or country?

Operations Se curity

Q15 Communication Security (COMSEC) is germane to ----- intelligence

counter

Q16 Data mining and ----- data analysis are inter-related as two of them play complementary roles in intelligence reporting as well as in security investigation

automa ted

Q17 Data ----- is sometimes called data or knowledge discovery

mining

Q18 Data ----- is usually defined as searching, analyzing and sifting through large amounts of data to find relationships, patterns, or any significant statistical correlations

mining

Q19 A ----- query assists us in our analysis of data to have more information about the subject and gives us a clearer picture of what the subject is up to especially as it concerns his/her activities

subject-based

Q20 Lack of ----- has really undermined the capacity of the police to perform its functions in Nigeria

technological innovation

Q21 what is the art and process of writing in secret character?

Crytography

Q22 we can adopt a ----- approach, using data mining to develop a model such that we search for anomalies or patterns that surround a behaviour or activity

􀳦??bottom-up􀳦 ?􀳦

Q23 We can use ----- approach in analysing our data by beginning the process of analysis with a hypothesis

􀳦??top-down"

Q24 Assets are also known as -----

Agents

Q25 what usually involves the art of convertly or secretly colecting information through the use of human sources?

Espio nage

Q26 if the result of an automated data analysis confirms a real crime suspect not culpable, it means the check is -----

entirely fa ulty

Q27 The possibility of wrongfully labelling an innocent person as a crime suspect/criminal is due to mistakes in the result of our automated data analysis that is usually associated with collection of ----- or misapplication of data through imperfect search models

wrong dat a

Q28 which of the following stands for scientific and technical intelligence

MASIN T

Q29 The following are Technical Intelligence collection disciplines except

HUMIN T

Q30 SIGNIT stands for -----

Signals Intelligence


Solutions2tma@gmail.com
Whatsapp: 08155572788

Stay informed when you download our app
https://play.google.com/store/apps/deta ... m.nounites



Jed
Posts: 993
Joined: Tue Oct 10, 2017 6:37 pm
Contact:

Re: NOUN TMA Solutions: CSS241 - Basic Security and Security threats

Postby Jed » Wed Aug 01, 2018 4:45 pm

Solutions2tma@gmail.com
Whatsapp: 08155572788

Stay informed when you download our app
https://play.google.com/store/apps/deta ... m.nounites


Q31 Intelligence collection ----- is believed to be pertinent to a decision-marker

Procureme nt

Q32 The sources of intelligence include all of the following except -----

Eating

Q33 what is the full meaning of SWOT analysis?

Strenghts, weakness, opportunities and threats

Q34 The traditional form of intelligence in which the intelligence activities take place outside the home country is known as -----

Foreign intelligence

Q35 one out of the following is not a cataegory of intelligence

Local intelligence

Q36 what does CIA stand for

Central Intelligence Agency

Q37 The last step in this process involves 􀳦??transforming the data to make them useful􀳦?􀳦. This step is usually known as -----

􀳦??data aggregation􀳦 ?􀳦

Q38 mention one of the dimensions of intelligence

Intelligence as a proces s

Q39 how many dimensions do Intelligence usually exhibit itself?

Thre e

Q40 Pattern-based queries involve conducting our investigation by moving from unknown to -----

know n

Q41 MicrokeRnel can be described as a computer kernel that ----- relevant mechanism.

enables

Q42 Fantasy and ----- usually involve developing games from wars generated from works of fiction or (creative) imagination.

science fiction

Q43 Persons, things, events or ideas, which pose accidentally or deliberately some degree or danger to an asset are otherwise called -----

security threats

Q44 Something which simulates a system or environment in order to predict actual behaviour is called ----

simulation

Q45 War-games are actually those games that involve drawing----- materials about wars that did not happen.

Simu lating

Q46 The jounces of intelligence are many to include the following except -----

Intelligence personnel

Q47 War-game can be clasified as historical, hypothetical, -----, or science fiction.

fantasy

Q48 The ----- methods of intelligence collection may include lockpicking, safecracking, finger-printing, electronic surveillance, mail manipulation, forgery among others.

Blake bag op erations

Q49 A secure ----- is dedicated for carrying out cryptographic operations

cryptoprocessor

Q50 Which tool is used to prevent any strange or unintended person from comprehending the content of a message

encry ption

Q51 Idealism, Pluralism and Realism are some approaches of -----

security management ,

Q52 Security comprises of -----?

human security
environmental s ecurity
spiritual security
***all of the above

Q53 According to ----- simulation helps to reduce the situation of crisis in patients

Eder-van Hook )2004 )

Q54 An earthquake has ----- points

two points

Q55 The term terrorism was popularized by the ----- who ruled France.

Jacobins

Q56 The act that involves coercing a person to part with either money, property or services to the offender is called -----

Extortion

Q57 Insurgency involves an armed struggle or rebellion aimed at challenging the sovereign power of a constituted -----.

authority

Q58 Terrorism is a modern concept

FALSE

Q59 The methods of ----- include suggestibility, Reid, Deception and torture

agent

Q60 security ----- is also a very viable approach to computer and information security

architecture





Solutions2tma@gmail.com
Whatsapp: 08155572788

Stay informed when you download our app
https://play.google.com/store/apps/deta ... m.nounites
Jed
Posts: 993
Joined: Tue Oct 10, 2017 6:37 pm
Contact:

Re: NOUN TMA Solutions: CSS241 - Basic Security and Security threats

Postby Jed » Wed Aug 01, 2018 4:55 pm

Solutions2tma@gmail.com
Whatsapp: 08155572788

Stay informed when you download our app
https://play.google.com/store/apps/deta ... m.nounites

Q61 what can be used to guarantee privilege separation and compulsory access control?

capability and access control list

Q62 It is noteworthy to know that there are inherent dangers in keeping files on the web, if adequate ----- cannot be guaranteed

Security

Q63 Automated Theorem Proving is a ----- tool

verification

Q64 What involves a technique in which we create password to restrict access to one􀳦??s computer

Authentic ation

Q65 The aim of anti-virus is to ----- the computer

protect

Q66 Anti-virus software is used to detect, prevent and destroy any -----

malw are

Q67 The first public virus ----- task was performed by Bernt Fix in 1987

Removal

Q68 Karl marx is one of the proponents of the youth ----- theory

bulge

Q69 Processing and issuance of passport is now done -----, and this appears to be faster and more convenient

electronically

Q70 The ----- theory was popularized by Paul and Patrick Brantingham

environmentalist

Q71 Files that fill up a whole building can be saved in a small and compact storage device like computer -- --- or removable disks

hard disk

Q72 In recent time, ----- have replaced normal traditional paper system where information is stored in physical files

compute rs

Q73 Simulation in ----- affords health care providers an opportunity to examine their capacity to respond to emergency situations

Health Care

Q74 According to ----- (2004) simulation helps to reduce the situation of crisis in patients

Eder-van Hook

Q75 believes that the best way through which we can control crime is to examine the nature of the crime, the conditions that produces such crimes as well as the impact of the crimes

Realism

Q76 Computer security is defined as all aspects of security, which involves protecting our computing systems from ----- attacks and intrusion

Malicious

Q77 Which of the following is not a solution to domestic violence?

Adequate finance to the couple o f violence ,

Q78 what is the theoretical approach that emerged in the 1920s, as an initiative to guarantee world peace and security

Idealism

Q79 One of these is not an element of compensation and rewards.

Benefits

Q80 In security job, the following are the criteria used in recruitment of personnel except one

Physical comba tants ,

Q81 MicrokeRnel can be described as a computer kernel that ----- relevant mechanism.

enables

Q82 Fantasy and ----- usually involve developing games from wars generated from works of fiction or (creative) imagination.

science fiction

Q83 Persons, things, events or ideas, which pose accidentally or deliberately some degree or danger to an asset are otherwise called -----

security threats

Q84 Something which simulates a system or environment in order to predict actual behaviour is called ----
-

simulation

Q85 War-games are actually those games that involve drawing----- materials about wars that did not happen.

Simu lating

Q86 The jounces of intelligence are many to include the following except -----

Intelligence personnel

Q87 War-game can be clasified as historical, hypothetical, -----, or science fiction.

fantasy

Q88 The ----- methods of intelligence collection may include lockpicking, safecracking, finger-printing, electronic surveillance, mail manipulation, forgery among others.

Blake bag op erations

Q89 A secure ----- is dedicated for carrying out cryptographic operations

cryptoprocessor

Q90 Which tool is used to prevent any strange or unintended person from comprehending the content of a message

encry ption





Solutions2tma@gmail.com
Whatsapp: 08155572788

Stay informed when you download our app
https://play.google.com/store/apps/deta ... m.nounites
Jed
Posts: 993
Joined: Tue Oct 10, 2017 6:37 pm
Contact:

Re: NOUN TMA Solutions: CSS241 - Basic Security and Security threats

Postby Jed » Wed Aug 01, 2018 5:08 pm

Solutions2tma@gmail.com
Whatsapp: 08155572788

Stay informed when you download our app
https://play.google.com/store/apps/deta ... m.nounites

Q91 Idealism, Pluralism and Realism are some approaches of -----

security management ,

Q92 Security comprises of -----?

human security
environmental s ecurity
spiritual security
***all of the above

Q93 According to ----- simulation helps to reduce the situation of crisis in patients

Eder-van Hook )2004 )

Q94 An earthquake has ----- points

two points

Q95 The term terrorism was popularized by the ----- who ruled France.

Jacobins

Q96 The act that involves coercing a person to part with either money, property or services to the offender is called -----

Extortion

Q97 Insurgency involves an armed struggle or rebellion aimed at challenging the sovereign power of a constituted -----.

authority

Q98 Terrorism is a modern concept

FALSE

Q99 The methods of ----- include suggestibility, Reid, Deception and torture

agent

Q100 security ----- is also a very viable approach to computer and information security

architecture

Q101 what can be used to guarantee privilege separation and compulsory access control?

capability and access control list

Q102 It is noteworthy to know that there are inherent dangers in keeping files on the web, if adequate ----- cannot be guaranteed

Security

Q103 Automated Theorem Proving is a ----- tool

verification

Q104 What involves a technique in which we create password to restrict access to one􀳦??s computer

Authentic ation

Q105 The aim of anti-virus is to ----- the computer

protect

Q106 Anti-virus software is used to detect, prevent and destroy any -----

malw are

Q107 The first public virus ----- task was performed by Bernt Fix in 1987

removal

Q108 Karl marx is one of the proponents of the youth ----- theory

bulge

Q109 Processing and issuance of passport is now done -----, and this appears to be faster and more convenient

electronically

Q110 The ----- theory was popularized by Paul and Patrick Brantingham

environmentalist

Q111 Files that fill up a whole building can be saved in a small and compact storage device like computer ----- or removable disks

hard disk

Q112 In recent time, ----- have replaced normal traditional paper system where information is stored in physical files

compute rs

Q113 Simulation in ----- affords health care providers an opportunity to examine their capacity to respond to emergency situations

Health Care

Q114 According to ----- (2004) simulation helps to reduce the situation of crisis in patients

Eder-van Hook

Q115 believes that the best way through which we can control crime is to examine the nature of the crime, the conditions that produces such crimes as well as the impact of the crimes

realism

Q116 Computer security is defined as all aspects of security, which involves protecting our computing systems from ----- attacks and intrusion

Malicious

Q117 Which of the following is not a solution to domestic violence?

Adequate finance to the couple o f violence ,

Q118 what is the theoretical approach that emerged in the 1920s, as an initiative to guarantee world peace and security

Idealism

Q119 One of these is not an element of compensation and rewards.

Benefits

Q120 In security job, the following are the criteria used in recruitment of personnel except one

Physical comba tants ,





Solutions2tma@gmail.com
Whatsapp: 08155572788

Stay informed when you download our app
https://play.google.com/store/apps/deta ... m.nounites


Who is online

Users browsing this forum: No registered users and 1 guest