FINALTERM EXAMINATION
Fall 2009
CS507- Information Systems

Question No: 1 ( Marks: 1 ) - Please choose one
Systems have collection of predefined ----------------------related to each other in a
sequenced logical manner in order to collectively achieve the desired results.


  • Procedures
  • Sequences
  • Policies


Question No: 2 ( Marks: 1 ) - Please choose one
After her third data processing clerk showed up at work with wrist braces, Ms. Jackson
called a specialty firm to assess the design of their work environment. This firm
specializes in _____:

  • furniture layout
  • video display terminals
  • Ergonomics
  • lighting


Question No: 3 ( Marks: 1 ) - Please choose one
Customer touch point is a method of interaction with a customer, such as telephone,
e-mail, a customer service or help desk, conventional mail, Web site and store.

  • True
  • False


Question No: 4 ( Marks: 1 ) - Please choose one
Buying and selling of products, services and information via computer networks,
primarily the Internet is :

  • E-Commerce
  • E-Business
  • Web Surfing
  • BPR


Question No: 5 ( Marks: 1 ) - Please choose one
Which of the following refers to the process of identifying attempts to
penetrate a system and gain unauthorized access?

  • Threat Identification
  • Intrusion detection
  • Access Control
  • All of above


Question No: 6 ( Marks: 1 ) - Please choose one
They represent Equations / Formulae representing relationship between two or
more factors related to each other in a defined manner is called------------

  • Graphical Model
  • Mathematical Model
  • Algebra Model


Question No: 7 ( Marks: 1 ) - Please choose one
Which of the following includes assessment of controls already been implemented or
planned, probability that they can be broken, assessment of potential loss despite such
controls existing?

  • Control Analysis
  • Vulnerability Assessment
  • Risk Management
  • All of above


Question No: 8 ( Marks: 1 ) - Please choose one
Likelihood Determination phase determines that a potential vulnerability could be exercised
by a given threat-source.

  • True
  • False


Question No: 9 ( Marks: 1 ) - Please choose one
Which of the following likelihood level is true for the following:
"The threat source lacks motivation or capability or controls are in place to prevent or at
least significantly impede the vulnerability from being exercised."

  • High
  • Low
  • Medium
  • None of these


Question No: 10 ( Marks: 1 ) - Please choose one
Production subsystem needs to be linked with the marketing system to --------------
right amount of product.

  • Produce
  • Sale
  • Purchase


Question No: 11 ( Marks: 1 ) - Please choose one
Which of the following focus on detecting potentially abnormal behavior in
function of operating system or request made by application software?

  • Active Monitors
  • Scanners
  • Anti virus
  • Behavior blockers


Question No: 12 ( Marks: 1 ) - Please choose one
The main source of bugs in computer programs is the complexity of decisionmaking
code.

  • True
  • False


Question No: 13 ( Marks: 1 ) - Please choose one
Entity represents sources of data received by the system or destinations of the data
produced by the system.

  • True
  • False


Question No: 14 ( Marks: 1 ) - Please choose one
The flowchart helps in locating and correcting errors also called debugging.

  • True
  • False


Question No: 15 ( Marks: 1 ) - Please choose one
The purpose of data flow diagrams is to provide a --------- between users and
systems developers


  • Linking bridge
  • Empty Space
  • Data Flows
  • Options a and b


Question No: 16 ( Marks: 1 ) - Please choose one
Which of the following level is formulation of new sales products, and
identifying new sales opportunities?

  • Operational
  • Managerial
  • Strategic


Question No: 17 ( Marks: 1 ) - Please choose one
Computer-aided manufacturing (CAM), is a form of automation where computers
communicate work instructions directly to the manufacturing machinery.

  • True
  • False


Question No: 18 ( Marks: 1 ) - Please choose one
The comparison of the actual with the expected is done with the help of _______

  • Input element
  • Processing
  • Control mechanism


Question No: 19 ( Marks: 1 ) - Please choose one
The spiral model emphasizes the need to go back and reiterate earlier steps a
number of times as the project progresses.

  • True
  • False


Question No: 20 ( Marks: 1 ) - Please choose one
Providing access to the data and behavior is through an object s interface is called
__________

  • Polymorphism
  • Encapsulation
  • Message passing


Question No: 21 ( Marks: 1 ) - Please choose one
Which of the following is a logical record of computer activities, usage, processing
pertaining to an operating or application system or user activities?

  • Control Log
  • Control trial
  • Audit trail


Question No: 22 ( Marks: 1 ) - Please choose one
Control Trial can be used together with access controls to identify and provide information
about users suspected of improper modification of data.

  • True
  • False


Question No: 23 ( Marks: 1 ) - Please choose one
Risk Management is the process of measuring, or assessing risk and then developing
strategies to manage the risk.

  • True
  • False


Question No: 24 ( Marks: 1 ) - Please choose one
In assessing risks for an IT system, _______________ is the first step.

  • To define the scope of the effort.
  • Vulnerability Assesment
  • threat identification


Question No: 25 ( Marks: 1 ) - Please choose one
Risk Management determines that a potential vulnerability could be exercised by a given
threat-source.

  • True
  • False


Question No: 26 ( Marks: 1 ) - Please choose one
Risk management is often based on the experience, insight and intuition of program
managers and key stakeholders in the program.

  • True
  • False


Question No: 27 ( Marks: 1 ) - Please choose one
Active Attack is one of the types of Web Security information systems.

  • True
  • False


Question No: 28 ( Marks: 1 ) - Please choose one
IDS works in conjunction with routers and firewalls by monitoring network usage anomalies
to protect a company s information systems resources from external as well as internal
misuse.

  • True
  • False


Question No: 29 ( Marks: 1 ) - Please choose one
Business-to-business EC (B2B) is one of the types of E-Commerce.

  • True
  • False


Question No: 30 ( Marks: 1 ) - Please choose one
Temporal CSFs in an organization, results from _________

  • Economic changes
  • Technological changes
  • Internal needs and changes
  • Environmental changes


Question No: 31 ( Marks: 1 )
What indicates the symbol Arrow in the flow charts?

Question No: 32 ( Marks: 1 )
Define Unfreezing class of Change.

Question No: 33 ( Marks: 2 )
What are the physical threats to the information systems?

Question No: 34 ( Marks: 2 )
What is cryptography?

Question No: 35 ( Marks: 3 )
What is off-page connector?

Question No: 36 ( Marks: 3 )
What is access control? Give example

Question No: 37 ( Marks: 3 )
List the Supply Chain Flows.

Question No: 38 ( Marks: 5 )
How the scanners are used as the technical control against the spread of
viruses?

Question No: 39 ( Marks: 5 )
Can you classify E-Commerce into different classes? Idetify any five.

Sponsored Links

Question No: 40 ( Marks: 10 )
What do you understand by Intruder? Classify and discuss intruders according to
way they operate.

Question No: 41 ( Marks: 10 )
Identify and define different levels of likelihood determination.