CS507 Information Systems Fall 2009 Final Term
FINALTERM EXAMINATION
Fall 2009
CS507- Information Systems
Question No: 1 ( Marks: 1 ) - Please choose one
Systems have collection of predefined ----------------------related to each other in a
sequenced logical manner in order to collectively achieve the desired results.
- Procedures
- Sequences
- Policies
Question No: 2 ( Marks: 1 ) - Please choose one
After her third data processing clerk showed up at work with wrist braces, Ms. Jackson
called a specialty firm to assess the design of their work environment. This firm
specializes in _____:
- furniture layout
- video display terminals
- Ergonomics
- lighting
Question No: 3 ( Marks: 1 ) - Please choose one
Customer touch point is a method of interaction with a customer, such as telephone,
e-mail, a customer service or help desk, conventional mail, Web site and store.
Question No: 4 ( Marks: 1 ) - Please choose one
Buying and selling of products, services and information via computer networks,
primarily the Internet is :
- E-Commerce
- E-Business
- Web Surfing
- BPR
Question No: 5 ( Marks: 1 ) - Please choose one
Which of the following refers to the process of identifying attempts to
penetrate a system and gain unauthorized access?
- Threat Identification
- Intrusion detection
- Access Control
- All of above
Question No: 6 ( Marks: 1 ) - Please choose one
They represent Equations / Formulae representing relationship between two or
more factors related to each other in a defined manner is called------------
- Graphical Model
- Mathematical Model
- Algebra Model
Question No: 7 ( Marks: 1 ) - Please choose one
Which of the following includes assessment of controls already been implemented or
planned, probability that they can be broken, assessment of potential loss despite such
controls existing?
- Control Analysis
- Vulnerability Assessment
- Risk Management
- All of above
Question No: 8 ( Marks: 1 ) - Please choose one
Likelihood Determination phase determines that a potential vulnerability could be exercised
by a given threat-source.
Question No: 9 ( Marks: 1 ) - Please choose one
Which of the following likelihood level is true for the following:
"The threat source lacks motivation or capability or controls are in place to prevent or at
least significantly impede the vulnerability from being exercised."
- High
- Low
- Medium
- None of these
Question No: 10 ( Marks: 1 ) - Please choose one
Production subsystem needs to be linked with the marketing system to --------------
right amount of product.
Question No: 11 ( Marks: 1 ) - Please choose one
Which of the following focus on detecting potentially abnormal behavior in
function of operating system or request made by application software?
- Active Monitors
- Scanners
- Anti virus
- Behavior blockers
Question No: 12 ( Marks: 1 ) - Please choose one
The main source of bugs in computer programs is the complexity of decisionmaking
code.
Question No: 13 ( Marks: 1 ) - Please choose one
Entity represents sources of data received by the system or destinations of the data
produced by the system.
Question No: 14 ( Marks: 1 ) - Please choose one
The flowchart helps in locating and correcting errors also called debugging.
Question No: 15 ( Marks: 1 ) - Please choose one
The purpose of data flow diagrams is to provide a --------- between users and
systems developers
- Linking bridge
- Empty Space
- Data Flows
- Options a and b
Question No: 16 ( Marks: 1 ) - Please choose one
Which of the following level is formulation of new sales products, and
identifying new sales opportunities?
- Operational
- Managerial
- Strategic
Question No: 17 ( Marks: 1 ) - Please choose one
Computer-aided manufacturing (CAM), is a form of automation where computers
communicate work instructions directly to the manufacturing machinery.
Question No: 18 ( Marks: 1 ) - Please choose one
The comparison of the actual with the expected is done with the help of _______
- Input element
- Processing
- Control mechanism
Question No: 19 ( Marks: 1 ) - Please choose one
The spiral model emphasizes the need to go back and reiterate earlier steps a
number of times as the project progresses.
Question No: 20 ( Marks: 1 ) - Please choose one
Providing access to the data and behavior is through an object s interface is called
__________
- Polymorphism
- Encapsulation
- Message passing
Question No: 21 ( Marks: 1 ) - Please choose one
Which of the following is a logical record of computer activities, usage, processing
pertaining to an operating or application system or user activities?
- Control Log
- Control trial
- Audit trail
Question No: 22 ( Marks: 1 ) - Please choose one
Control Trial can be used together with access controls to identify and provide information
about users suspected of improper modification of data.
Question No: 23 ( Marks: 1 ) - Please choose one
Risk Management is the process of measuring, or assessing risk and then developing
strategies to manage the risk.
Question No: 24 ( Marks: 1 ) - Please choose one
In assessing risks for an IT system, _______________ is the first step.
- To define the scope of the effort.
- Vulnerability Assesment
- threat identification
Question No: 25 ( Marks: 1 ) - Please choose one
Risk Management determines that a potential vulnerability could be exercised by a given
threat-source.
Question No: 26 ( Marks: 1 ) - Please choose one
Risk management is often based on the experience, insight and intuition of program
managers and key stakeholders in the program.
Question No: 27 ( Marks: 1 ) - Please choose one
Active Attack is one of the types of Web Security information systems.
Question No: 28 ( Marks: 1 ) - Please choose one
IDS works in conjunction with routers and firewalls by monitoring network usage anomalies
to protect a company s information systems resources from external as well as internal
misuse.
Question No: 29 ( Marks: 1 ) - Please choose one
Business-to-business EC (B2B) is one of the types of E-Commerce.
Question No: 30 ( Marks: 1 ) - Please choose one
Temporal CSFs in an organization, results from _________
- Economic changes
- Technological changes
- Internal needs and changes
- Environmental changes
Question No: 31 ( Marks: 1 )
What indicates the symbol Arrow in the flow charts?
Question No: 32 ( Marks: 1 )
Define Unfreezing class of Change.
Question No: 33 ( Marks: 2 )
What are the physical threats to the information systems?
Question No: 34 ( Marks: 2 )
What is cryptography?
Question No: 35 ( Marks: 3 )
What is off-page connector?
Question No: 36 ( Marks: 3 )
What is access control? Give example
Question No: 37 ( Marks: 3 )
List the Supply Chain Flows.
Question No: 38 ( Marks: 5 )
How the scanners are used as the technical control against the spread of
viruses?
Question No: 39 ( Marks: 5 )
Can you classify E-Commerce into different classes? Idetify any five.
Question No: 40 ( Marks: 10 )
What do you understand by Intruder? Classify and discuss intruders according to
way they operate.
Question No: 41 ( Marks: 10 )
Identify and define different levels of likelihood determination.