CS507 Quiz-4 by Vu Topper RM
CS507 Quiz-4 by Vu Topper RM
Which of the following is the science and art of transforming data into
secret code for transmission over a public network?
A. Firewall
B. Active Monitors
C. Cryptography
D. Antivirus
PIN is a secret shared between a user and a system that can be used to
authenticate the user to the system. In this context, what does PIN
stands for?
A. Personal Information Node
B. Password Indicating Null
C. Personal Identification Number Page 145
D. Password Indicator Number
When a customer enters the card and the pin code in an Automatic
Teller Machine (ATM), which of the following controls are exercised
by the system to block unwanted or illegitimate access?
A. Database Controls
B. Communication Controls
C. Input Controls
D. Access Controls Page 146
The flowchart helps in locating and correcting errors also called debugging.
Select correct option:
True Page No. 115
False
Which of the following is the process of quickly putting together a working model
in order to test various aspects of the design for gathering early user feedback?
Select correct option:
Interviews
Iteration
Prototyping PAGE 89
Questionnaires
Which of the following lifecycle model is very appropriate for large and complex
information systems?
Select correct option:
Spiral PAGE 88
Prototyping
Incremental
Waterfall
Which of the following process begins with stratifying system users and then
identifying their needs?
Select correct option:
Structuring
QA
Exploration
Design PAGE 81
Trying to fit people and organizations into information systems has been major
reason for ____________.
Select correct option:
success
Which of the following model can lead to scope creep due to user feedback after
each phase?
Select correct option:
Iterative PAGE 71
XP
Rapid prototyping
Waterfall
Which of the following is the core product which usually addresses the basic
requirements of the system?
Select correct option:
First increment PAGE 85
Second increment
Last increment
Final increment
Which of the following enunciate business goals and the actions that need to be
initiated to achieve those goals including related benefits, resources and
Which of the following defines the operations of the system in layman’s terms?
Select correct option:
User manual PAGE 82
Technical manual
Procedural manual
Testing manual
Which of the following model can lead to scope creep due to user feedback after
each phase?
Iterative page no 97
XP
Which of the following are knowledge workers who facilitate the development of
information systems and computer applications by bridging the communications
gap that exists between non-technical system users, and System designers and
developers?
System Analysts
System analysis creates the understanding and lays out the necessary relationships
that will assist in defining a solution to the problem or the design of the proposed
software that will meet the user needs.
True page no 102
False
Which of the following model is preferred for its simplicity and more disciplined
approach?
Incremental
Waterfall page no 93
Spiral
Which of the following addresses compliance and adjustability with the way
organization works with attitude to change or chains of command?
Operational feasibility page no 83
Technical feasibility
Tactical feasibility
Economic feasibility
Apart from the value to cost ratio, modules are also selected on the basis of
___________requirements and needs.
programmer
designer
customer page no 95
system analyst
Which of the following problems posses multiple solutions with fewer parameters
being less manipulate able?
Unstructured
Partially structured
Semi structured
Which of the following is the core product, which usually addresses the basic
Trying to fit people and organizations into information systems has been major
reason for ____________.
success
efficiency
increased productivity
failure page no 86
In drawing a proper flowchart, all necessary steps that are a part of process should
be listed out in ________________ order.
Logical page no 109
In which of the following model, the system development is broken into many
mini development projects.
Spiral
Incremental page no 95
Iterative
Waterfall
Which of the following are knowledge workers who facilitate the development of
information systems and computer applications by bridging the communications
gap that exists between non-technical system users, and System designers and
developers?
System Analysts page no 103
Software Engineers
Apart from the value to cost ratio, modules are also selected on the basis of
___________requirements and needs.
programmer
designer
customer
system analyst
Which of the following allows manufacturers to rapidly and inexpensively test the
parts of the design which are most likely to have problems?
Select correct option:
Prototype Page No. 100
Trial version
Which of the following are knowledge workers who facilitate the development of
information systems and computer applications by bridging the communications
gap that exists between non-technical system users, and System designers and
developers?
Select correct option:
System Analysts Page No. 103
Software Engineers
Which of the following is used to test the function of the new design before
starting production of a product?
Select correct option:
Which of the following is the core product which usually addresses the basic
requirements of the system?
Select correct option:
First increment page no 95
Second increment
In drawing a proper flowchart, all necessary steps that are a part of process should
be listed out in ________________ order.
Select correct option:
Logical page no 109
Physical
Customer touch point is a method of interaction with a customer, such as
telephone, e-mail, a customer service or help desk, conventional mail, Web site
and store.
True
False
The bullwhip effect refers to erratic shifts in orders up and down the supply chain
because of poor demand forecasting, price fluctuation, order batching, and
The comparison of actual system with expected system is done with the help of
control mechanism.
False
True
Data travels across the internet through several levels of networks until it reaches
its middle point.
True
False
An IDS with the neural network feature monitors the general patterns of activity
and traffic on the network and creates a database.
True
False
Ethics is a branch of science that deals with what is considered to be right and
wrong.
True
False
Buying and selling of products, services and information via computer networks,
primarily through Internet is:
E-Commerce
E-Business
Web Surfing
BPR
In which of the following decisions the problems are non routine, critical and
novel in nature, require individual judgment, evaluation and insight varying on
case-to-case basis.
Semi-Structured decisions
Unstructured decision
Which of the following is the process of quickly putting together a working model
in order to test various aspects of the design for gathering early user feedback?
Select correct option:
Interviews
Iteration
Prototyping PAGE 89
Questionnaires
Which of the following lifecycle model is very appropriate for large and complex
information systems?
Select correct option:
Spiral PAGE 88
Prototyping
Incremental
Waterfall
A denial-of-service attack floods a Web site with so many requests for services
that it slows down or crashes
Select correct option:
True
False
Which of the following may also detect outbound traffic to guard against spy
ware, which could be sending your surfing habits to a Web site?
Select correct option:
Personal Firewall
Password
PIN
ID
Which of the following are normally skilled programmers, and have been known
to crack system passwords, with ease?
Select correct option:
Hackers
Crackers
Hacktivists
Intruders
Which of the following skills needed to exploit logical exposures are more
technical and complex as compared to physical exposures.
Select correct option:
Logical Intrusion
Active Monitors
Behavior Blockers
Scanners
Which of the following is a program not a virus but it installs a virus on the PC
while performing another function?
Dropper
Logical Intrusion skills needed to exploit logical exposures are more technical
and complex as compared to physical exposures.
True Page 143
False
Which of the following is the secret character string that is required to log onto a
computer system?
ID
PIN
PASSWORD Page 144
none of these
Which of the following refers to damage caused to the software and data without
any physical damage to the computers?
Logical Threat Page 139
Physical Threat
Option a and b
None of above options
Which of the following controls over transporting data safely through local area
networks (LAN’s) or wide area networks (WAN’s).
Communication Controls Page 147
Access Controls
Security Controls
Data Base Controls
Which of the following is a person who attempts to invade the privacy of the
system.
Hacker Page 144
Cracker
Sniffer
Spammer
Which of the following controls have gained critical importance in the modern
computing age for two significant reasons?
Access Page 146
Communication
Data Base
Output
Which of the following may also detect outbound traffic to guard against spy
ware, which could be sending your surfing habits to a Web site
Personal Firewall Page 145
Password
PIN
ID
Which of the following refers to individuals using their skills to forward a political
agenda, possibly breaking the law in the process, but justifying their actions for
political reasons?
Hacker
Intruder
Hacktivist Page 144
Cracker
The virus or bug being installed to corrupt data or software might create BAD
SECTORS on the hard drive, leading to its preferable removal from the
computer is an example of the following
Logical Threat Page 139
Physical Threat
option a and b
None of above options
Worms can destroy data and programs as well as disrupt or even halt the
operation of computer networks.
True
False
Which of is the primary method for keeping a computer secure from intruders.
Anti-Virus
Scanner
Fire Wall Page 155
IDS
A denial-of-service attack floods a Web site with so many requests for services
that it slows down or crashes
Select correct option:
True
False