999
999
.
lue
neither interpreted nor condensed nor evaluated by other writers ?
va
► Primary Information PAGE 2
igh
► Tertiary Information
...H
► Secondary Information
ice
► All of above
erv
ys
Question No: 2 ( Marks: 1 ) - Please choose one
as
Ethical issues may be categorized into which of the following types?
...E
► Privacy
ice
►Accuracy
ho
tc
►Property
es
After her third data processing clerk showed up at work with wrist braces, Ms.
.co
Jackson called a specialty firm to assess the design of their work environment.
sk
de
►Ergonomics
►lighting
►furniture layout
►False
.
lue
Question No: 5 ( Marks: 1 ) - Please choose one
va
Leading ERP software vendors include SAP (SAP R/3), Oracle and PeopleSoft
igh
...H
►True
ice
►False
erv
ERP software systems may include application modulesfor supporting marketing,
ys
finance, accounting and human resources.
as
Question No: 6 ( Marks: 1 ) - Please choose one
...E
With a decision environment, there is the possibility of having very quick and
► Open-loop
► Closed System
The major purpose of enhancing web security is to protect web ser the use of
.
lue
internet.
va
► True PAGE 170
igh
...H
► False
ice
Question No: 9 ( Marks: 1 ) - Please choose one
erv
Which of the following usually contain records describing system events, or user
ys
events?
► Option a and b
tc
► None of these
es
.B
Which of the following is the science and art of transforming messages to make
m.
.co
► Cryptography
de
► Crypto analysis
/vu
p:/
► Decryption
htt
► All of these
Crypto Analysis is the science and art of transforming messages to make them
secure and immune to attacks.
► False
► True
.
lue
function of operating system or request made by application software?
va
► Scanners
igh
...H
► Anti virus
ice
► Behavior blockers PAGE 143
erv
► Active Monitors
ys
Question No: 13 ( Marks: 1 ) - Please choose one
as
Which of the following is the primary method for keeping a computer secure
...E
from intruders?
ice
ho
► Anti virus
tc
► Scanners
es
.B
► Password
m.
.co
► False
A denial-of-service attack floods a Web site with so many requests for services
► False
code.
.
lue
► True
va
► False
igh
...H
Question No: 17 ( Marks: 1 ) - Please choose one
ice
Which of the following is some action or event that can lead to a loss?
erv
►Threat PAGE 132
ys
►Damage
► Accident
as
...E
►None of above
ice
ho
►Threats
....
► Damages
m.
.co
► Logical Threats
de
Which of the following is an object that exists and is distinguishable from oth
htt
objects?
► Entity 113
► Attribute
► Object
► Instance
► TRUE
► FALSE
.
lue
Question No: 21 ( Marks: 1 ) - Please choose one
va
Decision making is the cognitive process of selecting a course of action from
igh
...H
among alternatives.
ice
► Multiple59
erv
► Double
ys
► Triple
as
Question No: 22 ( Marks: 1 ) - Please choose one
...E
► TRUE PAGE 61
tc
► FALSE
es
.B
► Manufacturing Sector
de
► Trading sector
/vu
p:/
Which of the following model combines the elements of the waterfall model with
► Iterative
► Incremental PAGE 84
► Raid
► Functions
► Signatures
.
lue
► Methods
va
Question No: 26 ( Marks: 1 ) - Please choose one
igh
...H
Control Trial can be used together with access controls to identify and provide
ice
information about users suspected of improper modification of data.
erv
► True
ys
► False
as
AUDIT trails can be used together with access controls to identify and provide
...E
information
ice
ho
planned probability that they can be broken, assessment of potential loss despite
....
► True
sk
► False PAGE
de
► Risk
► Threat
► Intrusion
communication.
.
lue
► True page 128
va
► False
igh
...H
Question No: 30 ( Marks: 1 ) - Please choose one
ice
Benefits to ERP systems are that they can be extra time-consuming to implement.
erv
► True
ys
► False
.
lue
The concept of security applies to all information. Discuss what is the objective
va
and scope of Security? What may be the security issues regarding information
igh
...H
and what will be the management responsibility to resolve these issues?
ice
Question No: 41 ( Marks: 10 )
erv
What is polymorphism? Define with example.
ys
as
...E
ice
ho
tc
es
.B
....
m.
.co
sk
de
/vu
p:/
htt