Sponsored Links

Results 1 to 1 of 1

Thread: CS507 current subjective and objective paper fall 2010 on 19-02-2011

  1. #1
    Administrator Xpert's Avatar
    Join Date
    May 2010

    Moodle CS507 current subjective and objective paper fall 2010 on 19-02-2011

    Sponsored Links1

    Q:Information technology can lead to decreased electronic supervision of employees.

    An IDS with the following feature monitors the general patterns of activity and
    traffic on the network and creates a database:

    Neural Networks
    Single Based

    Which of the following is a weakness that can be accidentally triggered or intentionally exploited?
    Threat Identification
    Audit Trial
    Likelihood Identification

    Which of the following may include program code of application softwares, technical manuals, user manuals etc?
    Audit Trial
    Control Trial
    None of these

    Cryptography primarily consists of two basic processes.
    Which of the following is the study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits?
    Access Controls
    Input Controls
    Firewall is the primary method for keeping a computer secure from intruders.
    Which of the following refers to damage caused to the software and data without any physical damage to the computers?

    Logical Threat
    Physical Threat
    Both a and b
    None of these
    Which of the following is an object that exists and is distinguishable from other objects?

    Null value may or may not be called zero value.

    Which of the following is true about “Entity”?
    Entity may be any person, place, or thing about which someone is interested to store data.
    Entity may have attributes associated with it
    Entities are normally mapped to Tables in relational database management systems.
    All of above
    In drawing a proper flowchart, all necessary steps that are a part of process should be listed out in ---------------------- order.

    Top to Bottom

    Management is concerned with the day to day costs, production targets in ____
    Service sector
    Manufacturing Sector
    Trading sector

    The spiral lifecycle model is a combination of the classic RAID model and aspects of risk analysis.
    Object oriented analysis focuses on the _________
    States of objects
    Collaboration of objects
    Implementation of objects

    Testing is easy for the software that is developed using OOAD due to use of ___________
    Modular approach
    Real time modeling
    Usability feature

    Temporal CSFs in an organization, results from _________
    Economic changes
    Technological changes
    Internal needs and changes
    Environmental changes

    Which of the following information is required before conducting an impact analysis?
    System and data criticality
    System and data sensitivity
    System mission
    All of the above

    A problem solving technique that decomposes a system into its component pieces for the purpose of studying, how well those component parts work and interact to accomplish their purpose is called:
    System Analysis
    System Requirements
    Risk Management
    Risk Analysis

    Every decision we take in daily life requires some sort of information about the alternatives available.

    A structure through which individuals cooperate systematically to conduct business is called organization.

    Medium Sized organizations are normally a family ownership run by
    Father & Sons
    Father, Sons and Brothers
    None of the given

    Which of the following phase of decision making process involves checking the consequences of the decision made after implementation?

    Which of the following level is formulation of new sales products, and identifying new sales opportunities?

    Which of the following refers to the process of identifying attempts to penetrate a system and gain unauthorized access?
    Threat Identification
    Intrusion detection
    Access Control
    All of above

    Access Control refers to the process of identifying attempts to penetrate a system and gain unauthorized access.

    Leading CRM software vendors include SAP (SAP R/3), Oracle and PeopleSoft.

    What are the parameters to be covered by Designing usable and complete input?

    What should be the most important information required for large organizations in your opinion?

    Define Business Continuity Planning (BCP) ?

    What are the security threats to information system?

    Define Firewall ?

    Define the objective of Enterprise Resource Planning?

    What are the challenges to organizations for launching Ecommerce? Identify any three.
    What is Data Driven Decision Support System?
    What is the necessary information needed to begin impact analysis?
    List down components of an Intrusion Detection System ?
    Identify the information that is required before conducting an impact analysis ?
    Discuss Web Security Audit ?
    Organizations work with various computing environments for proper use of information system. Discuss the following computing environment :
    Standalone Processing
    Discuss System Characterization ? What information may help to characterize the system ?

    Sponsored Links
    Attached Files Attached Files

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Replies: 0
    Last Post: 02-21-2011, 04:48 AM
  2. Replies: 0
    Last Post: 02-21-2011, 04:46 AM
  3. Replies: 0
    Last Post: 02-21-2011, 04:43 AM
  4. Replies: 0
    Last Post: 02-19-2011, 11:45 PM
  5. Replies: 0
    Last Post: 02-19-2011, 11:37 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
-: Vuhelp Disclaimer :-
None of the files shown here are hosted or transmitted by this server. The links are provided solely by this site's users. The administrator's or staff of Vuhelp.net cannot be held responsible for what its users post, or any other actions of its users. You may not use this site to distribute or download any material when you do not have the legal rights to do so. It is your own responsibility to adhere to these terms. If you have any doubts about legality of content or you have any suspicions, feel free to contact us.
Online Education | JhelumSoft