Final term Examination
CS – 507 (Information Systems)
2010
Automated data are less susceptible to destruction and misuse than paper data
a) True
b) False
Documentation may include program code of application softwares, technical manuals, user manuals e
a) True
b) False
Which of the following likelihood level is true for the following: "The threat source lacks motivation or capability or controls are in place to prevent or at least significantly impede the vulnerability from being exercised."
a) High
b) Low
c) Medium
d) None of these
Which of the following level is formulation of new sales products, and identifying new sales opportunities?
a) Operational
b) Managerial
c) Strategic
The spiral model emphasizes the need to go back and reiterate earlier steps a number of times as the project progresses.
a) True
b) False
In assessing risks for an IT system, _______________ is the first step.
a) To define the scope of the effort.
b) Vulnerability Assesment
c) threat identification
IDS works in conjunction with routers and firewalls by monitoring network usage anomalies to protect a company s information systems resources from external as well as internal misuse.
a) True
b) False
Which of the following model combines the elements of the waterfall model with the philosophy of prototyping?
► Prototyping
► Iterative
► Incremental
► RAID
__________ sources materials in which the information from secondary sources has been digested.
►Primary
►Tertiary
►Secondary
Targeting advertising to customers to -------------- the probability, that an offer is accepted.
► Decrease
► Increase
► Stable
Information technology has been criticized for having a negative effect on people's individuality
► False
► True
In which of the following there is a direct interaction facilitated by auctions, classifieds, and bartering?
► EGovernment
► MCommerce
► Consumer-to-consumer EC
► Intrabusiness EC
Nature of vulnerability is an input source for Likelihood determination
► True
► False
A Trojan horse virus stays dormant until a specific time or data condition is met.
►True
►False
Object orientation helps in increasing abstraction level to build _________
►Testable software
►Reusable software
►Maintainable software
Encapsulation means information
hiding.
The use of software routines to tie up the computer hosting a Web site that denies legitimate visitor's access is called :
Select correct option:
denial of service
hacking.
Spoofing
Sniffing
Fire wall is the primary method for keeping a computer secure from intruders.
True
False
Why use in arrow of process in the flow chart? (Marks 1)
What is Object Oriented Analysis and Design (OOAD)? (Marks 1)
Critical Success Factors differ from organization to organization. While approving any project, the
management may evaluate the project on the basis of certain factors critical to the success or failure of the
project. Five example in real life (Marks 10)
What do you understand by computing envroiment. Describe the • Stand Alone Processing and Web Based Environment (Marks 5)
Roles & Responsibility any three (Marks 3)
What is focal Point? Complete(Marks 10)
What is Vulnerability? (Marks 1)
Two output of Impact Analysis? (Marks 2)
What is challenge in lunching ecommerce? (Marks 5)
What is change management. Identify its types ? (Marks 5)
What is difference between the Changing and Freezing? (Marks 3)
No comments:
Post a Comment
PLEASE COMMENT ABOUT YOUR VISIT AND MY SITE
Note: Only a member of this blog may post a comment.