FINALTERM EXAMINATION
Spring 2010
CS507- Information Systems
Question No: 1 ( Marks: 1 ) - Please choose one
Medium Sized organizations are normally a family ownership run by
► Father & Sons
► Brothers
► Father, Sons and Brothers
► None of the given
Question No: 2 ( Marks: 1 ) - Please choose one
High level of foreign trade has resulted in imports and exports which require inter linkage for smooth coordination.
► True
► False
Question No: 3 ( Marks: 1 ) - Please choose one
ERP or enterprise systems control all major business processes with a single software architecture in real time.
► False
► True
Question No: 4 ( Marks: 1 ) - Please choose one
The bullwhip effect refers to erratic shifts in orders up and down the supply chain because of poor demand forecasting, price fluctuation, order batching, and rationing within the chain.
► True
► False
Question No: 5 ( Marks: 1 ) - Please choose one
Which of the following works in conjunction with routers and firewalls by monitoring network usage anomalies to protect a company’s information systems resources from external as well as internal misuse?
► Encryption
► Intrusion Detection Systems
► Firewall
► All of above
Question No: 6 ( Marks: 1 ) - Please choose one
The major purpose of enhancing web security is to protect web server from attacks through the use of internet.
► True
► False
Question No: 7 ( Marks: 1 ) - Please choose one
The Internet Protocol is designed solely for the addressing and routing of data packets across a network
► True
► False
Question No: 8 ( Marks: 1 ) - Please choose one
Passive Attack is one of the types of Web Security Threats
► True
► False
Question No: 9 ( Marks: 1 ) - Please choose one
Audit Trials can be used together with controls trials to identify and provide information about users suspected of improper modification of data.
► True
► False
Question No: 10 ( Marks: 1 ) - Please choose one
MKIS helps organizations in efficient channel management
► True
► False
Question No: 11 ( Marks: 1 ) - Please choose one
Crypto Analysis is the science and art of transforming messages to make them secure and immune to attacks.
► True
► False
Question No: 12 ( Marks: 1 ) - Please choose one
Active Monitor software serves the concurrent monitoring as the system is being used.
► True
► False
Question No: 13 ( Marks: 1 ) - Please choose one
The protection of the interests of those relying on information, and the information systems and
communications that delivers the information, from harm resulting from failures of availability,
confidentiality, and integrity.
► False
► True
Question No: 14 ( Marks: 1 ) - Please choose one
The purpose of a class is to specify a classification of objects and to specify the features that characterize the structure and behavior of those objects.
► True
► False
Question No: 15 ( Marks: 1 ) - Please choose one
In drawing a proper flowchart, all necessary steps that are a part of process should be listed out in ---------------------- order.
► Logical
► Physical
► Random
► Top to Bottom
Question No: 16 ( Marks: 1 ) - Please choose one
The departmental structures are different in banking and financial sector
► False
► True
Question No: 17 ( Marks: 1 ) - Please choose one
Production subsystem needs to be linked with the marketing system to produce right amount of product.
► True
► False
Question No: 18 ( Marks: 1 ) - Please choose one
DSS can be used to simulate the consequences of each alternative generated.
► TRUE
► FALSE
Question No: 19 ( Marks: 1 ) - Please choose one
Which of the following select chief executive?
► Employees
► Customers
► Board of Directors
Question No: 20 ( Marks: 1 ) - Please choose one
A schematic representation of a sequence of operations as in a manufacturing process or computer program is called __________
► Algorithm.
► Entity Relationship Diagram
► Flowchart
Question No: 21 ( Marks: 1 ) - Please choose one
Rounded shaped symbol in the flow chart is called ____________
► Connector
► Arrow
► Process
Question No: 22 ( Marks: 1 ) - Please choose one
________ Focus on detecting potentially abnormal behavior in function of operating system or request made by application software
► Behavior blockers
► Active monitors
► Scanners
Question No: 23 ( Marks: 1 ) - Please choose one
Testing is easy for the software that is developed using OOAD due to use of ___________
► Modular approach
► Real time modeling
► Usability feature
Question No: 24 ( Marks: 1 ) - Please choose one
Threat source motivation is an output for Likelihood determination
► True
► False
Question No: 25 ( Marks: 1 ) - Please choose one
Administrative Consol is one of the components of Intrusion Detection System (IDS).
► True
► False
Question No: 26 ( Marks: 1 ) - Please choose one
Preparing a situation for change by disconfirming existing attitudes and
behaviors is called Unfreezing.
► True
► False
Question No: 27 ( Marks: 1 ) - Please choose one
The purpose of data flow diagrams is to provide a --------- between users and systems developers
► Linking bridge
► Empty space
► Data Flows
► Options a and b
Question No: 28 ( Marks: 1 ) - Please choose one
Availability of which of the following to various users also depends on how the information is processed?
► Information
► Data
► Log File
► None of the above
Question No: 29 ( Marks: 1 ) - Please choose one
Which of the following is the characteristic of being able to assign a different meaning or usage to something in different contexts - specifically?
► OOP
► Polymorphism
► Encapsulation
► Inheritance
Question No: 30 ( Marks: 1 ) - Please choose one
_______ is the science of coded writing.
► Decryption
► Cryptography
► Encryption
Question No: 31 ( Marks: 2 )
What is the basic purpose of setting up systems and procedures. Give your own opinion.
Question No: 32 ( Marks: 2 )
Define threat and identify its types.
Question No: 33 ( Marks: 2 )
List any two types of information that can be used as input for vulnerability ?
Question No: 34 ( Marks: 2 )
Identify leading ERP software vendors ?
Question No: 35 ( Marks: 3 )
Define Risk Determination. Identify its inputs and outputs.
Question No: 36 ( Marks: 3 )
What are the types of threats?
Question No: 37 ( Marks: 3 )
Differentiate between Incremental and iterative models with the help of one example each.
Question No: 38 ( Marks: 3 )
Identify any six factors that should be considered in order for change to be successful?
Question No: 39 ( Marks: 5 )
Define the following:
a) EC (Ecommerce)
b) EB (Ebusiness)
Question No: 40 ( Marks: 5 )
Identify and define the types of active attacks ?
No comments:
Post a Comment
PLEASE COMMENT ABOUT YOUR VISIT AND MY SITE
Note: Only a member of this blog may post a comment.