FINALTERM  EXAMINATION
Spring 2010
CS507- Information Systems
Question No: 1      ( Marks: 1 ) - Please choose one
Medium Sized organizations are normally a family ownership run by
      ► Father & Sons
       ► Brothers
► Father, Sons and Brothers
► None of the given
Question No: 2      ( Marks: 1 ) - Please choose one
High level of foreign trade has resulted in imports and exports which require inter linkage for smooth coordination.
► True
       ► False
Question No: 3      ( Marks: 1 ) - Please choose one
ERP or enterprise systems control all major business processes with a single software architecture in real time.
       ► False
      ► True
Question No: 4      ( Marks: 1 ) - Please choose one
The  bullwhip effect refers to erratic shifts in orders up and down the  supply chain because of poor demand forecasting,  price fluctuation,  order batching, and rationing within the chain.
       ► True
       ► False
Question No: 5      ( Marks: 1 ) - Please choose one
Which  of the following  works in conjunction with routers and firewalls by  monitoring network usage anomalies to  protect a company’s information  systems resources from external as well as internal misuse?
       ► Encryption
       ► Intrusion Detection Systems
       ► Firewall
       ► All of above
Question No: 6      ( Marks: 1 ) - Please choose one
The major purpose of enhancing web security is to protect web server from attacks through the use of internet.
       ► True
       ► False
Question No: 7      ( Marks: 1 ) - Please choose one
The Internet Protocol is designed solely for the addressing and routing of data packets across a network
       ► True
       ► False
Question No: 8      ( Marks: 1 ) - Please choose one
Passive Attack is one of the types of Web  Security Threats
       ► True
       ► False
Question No: 9      ( Marks: 1 ) - Please choose one
Audit  Trials can be used together with  controls trials to identify and  provide information about users suspected of improper modification of  data.
       ► True
       ► False
Question No: 10      ( Marks: 1 ) - Please choose one
MKIS helps organizations in efficient channel management
       ► True
       ► False
Question No: 11      ( Marks: 1 ) - Please choose one
Crypto Analysis  is the science and art of transforming messages to make them secure and immune to attacks.
       ► True
       ► False
Question No: 12      ( Marks: 1 ) - Please choose one
Active Monitor software serves the concurrent monitoring as the system is being used.
       ► True
       ► False
Question No: 13      ( Marks: 1 ) - Please choose one
The protection of the interests of those relying on information, and the information systems and
communications that delivers the information, from harm resulting from failures of availability,
confidentiality, and integrity.
       ► False
       ► True
Question No: 14      ( Marks: 1 ) - Please choose one
The  purpose of a class is to specify a classification of objects and to  specify the features that characterize the structure and behavior of  those objects.
       ► True
       ► False
Question No: 15      ( Marks: 1 ) - Please choose one
In  drawing a proper flowchart, all necessary steps that are a part of  process should be listed out in ---------------------- order.
       ► Logical
       ► Physical
       ► Random
       ► Top to Bottom
Question No: 16      ( Marks: 1 ) - Please choose one
The departmental structures are different in banking and financial sector
       ► False
       ► True
Question No: 17      ( Marks: 1 ) - Please choose one
Production subsystem needs to be linked with the marketing system to produce right amount of product.
       ► True
       ► False
Question No: 18      ( Marks: 1 ) - Please choose one
DSS  can be used to simulate the consequences of each alternative generated.
       ► TRUE
       ► FALSE
Question No: 19      ( Marks: 1 ) - Please choose one
Which of the following  select chief executive?
       ► Employees
       ► Customers
       ► Board of Directors
Question No: 20      ( Marks: 1 ) - Please choose one
A schematic representation of a sequence of operations as in a manufacturing process or computer program is called __________
       ► Algorithm.
       ► Entity Relationship Diagram
       ► Flowchart
Question No: 21      ( Marks: 1 ) - Please choose one
Rounded shaped symbol in the flow chart is called ____________
       ► Connector
       ► Arrow
       ► Process
Question No: 22      ( Marks: 1 ) - Please choose one
________  Focus on detecting potentially abnormal behavior in function of  operating system or request made by application software
       ► Behavior blockers
       ► Active monitors
       ► Scanners
Question No: 23      ( Marks: 1 ) - Please choose one
Testing is easy for the software that is developed using OOAD due to use of ___________
       ► Modular approach
       ► Real time modeling
       ► Usability feature
Question No: 24      ( Marks: 1 ) - Please choose one
Threat source motivation is an output  for Likelihood determination
       ► True
       ► False
Question No: 25      ( Marks: 1 ) - Please choose one
Administrative Consol is one of the components of Intrusion Detection System (IDS).
       ► True
       ► False
Question No: 26      ( Marks: 1 ) - Please choose one
Preparing a situation for change by disconfirming existing attitudes and
behaviors is called Unfreezing.
       ► True
       ► False
Question No: 27      ( Marks: 1 ) - Please choose one
The purpose of data flow diagrams is to provide a --------- between users and systems developers
       ► Linking bridge
       ► Empty space
       ► Data Flows
       ► Options a and b
Question No: 28      ( Marks: 1 ) - Please choose one
Availability of which of the following  to various users also depends on how the information is processed?
       ► Information
       ► Data
       ► Log File
       ► None of the above
Question No: 29      ( Marks: 1 ) - Please choose one
Which  of the following is the characteristic of being able to assign a  different meaning or usage to something in different contexts -  specifically?
       ► OOP
       ► Polymorphism
       ► Encapsulation
       ► Inheritance
Question No: 30      ( Marks: 1 ) - Please choose one
_______ is the science of coded writing.
       ► Decryption
       ► Cryptography
       ► Encryption
Question No: 31      ( Marks: 2 )
What is the basic purpose of setting up systems and procedures. Give your own opinion.
Question No: 32      ( Marks: 2 )
Define threat and identify its types.
Question No: 33      ( Marks: 2 )
List any two types of information that can be used as input for vulnerability ?
Question No: 34      ( Marks: 2 )
Identify leading ERP software vendors ?
Question No: 35      ( Marks: 3 )
Define Risk Determination. Identify its inputs and outputs.
Question No: 36      ( Marks: 3 )
What are the types of threats?
Question No: 37      ( Marks: 3 )
Differentiate between Incremental and iterative models with the help of one example each.
Question No: 38      ( Marks: 3 )
 Identify any six factors that should be considered in order for change to be successful?
Question No: 39      ( Marks: 5 )
Define the following:
a)      EC (Ecommerce)
b)      EB (Ebusiness)
Question No: 40      ( Marks: 5 )
Identify and define the types of active attacks ?

 
 
0 comments:
Post a Comment