Professional Documents
Culture Documents
Askari Team
Vu Askari Team
www.vuaskari.com
CS507 Online Quiz#2…Covering
Lecture#23 to 32..
Solved by
Askari Team…
Question # 1 of 10 ( Start time: 12:19:02 AM ) Total Marks: 1
Determining classification levels along with maintaining accuracy and integrity of the
data in the information system is the responsibility of _________.
Select correct option:
System auditors
Data owners
Process owners
End users
Concurrency
System behavior
Distribution
Persistence
True
False
True
False
Attribute
Entity Set
Relation
Entity
True
False
True
False
True
False
Viruses
Worms
Trojans
Sniffers
DoS viruses
UML
Sequential
Flow
ER
Methods
Operations
Attributes
Status
Technical CSFs
Industry CSFs
Environmental CSFs
Temporal CSFs
Sub classes
Sub Interfaces
Sub objects
super set
Has kind of
Is based on
Is similar to
Is kind of
Completeness
Consistency
Reliability
Confidentiality
True
False
Security Professionals
Executive Management
Data Owners
Option a and b
Has kind of
Is based on
Is similar to
Is kind of
Implementation of objects
States of objects
Identity of objects
Collaboration of objects
Intrusion
Damage
Threat
None of these options
Same
Decision
Process
Terminator
Relationship
3
4
5
6
Methods
Status
Attributes
Instances
True
False
True
False
Economic changes
Internal needs and changes
Technological changes
Environmental changes
Output
Input
Processing
Sequence
True
False
False
True
Polymorphism
Encapsulation
Message passing
Inheritance
True
False
Wireless communication
Intranet
Internet
None of above
Detection
Planning
Scrutiny
Avoidance
fixed
variable
subnet
changeable
UML
Sequential
Flow
Economic changes
Internal needs and changes
Technological changes
Environmental changes
Decision
Process
Terminator
Relationship
Collaboration
State
Implementation
Sequence
True
False
Attribute
Entity Set
Signatures
Classes
Methods
Objects
user’s rights
privileges
integrity
privacy
Centralized
Stand Alone
Distributed
Web based
True
False
True
False
True
False
True
False
True
False
True
False
Security Professionals
Executive Management
Data Owners
Option a and b
True
False
Social Engineering
Snooping
Spoofing
Spamming
System interfaces
Integrity constraints
Completeness constraints
System’s conceptual model
Incremental approach
Modular approach
Traditional approach
Derived approach
Logical Threat
Physical Threat
Option a and b
None of above options
True
False
True
False
Collaboration
State
Implementation
Sequence
Inheritance
Encapsulation
Generalization
Polymorphism
Social Engineering
Snooping
Spoofing
Spamming
Detection
Criticality analysis
Scrutiny
Mitigation
True
False
True
False
Inheritance
data communication
Message passing
chatting
Availability
Integrity
Confidentiality
All of the above
True
False
DoS viruses
Worm viruses
Virus hoaxes
Trojan horses
True
False
Output
Input
Processing
Sequence
Limited
Centralized
Flexible
Integrated
True
False
True
False
True
False
Procedural
Abstract
Internal
Diagrammatic
Dropper
Trojans
worm
None of above options
Wireless communication
Intranet
Internet
None of above
Same
Different
Unique
None of the above
System Analysis
System Design
Risk Management
Risk Analysis
Methods
Functions
Signatures
Interfaces
True
False
True
False
BPR
CSF
MIS
SPR
True
False
Implementation of objects
States of objects
Identity of objects
Collaboration of objects
System auditors
Data owners
Process owners
End users
True
False
Technical CSFs
Industry CSFs
Environmental CSFs
Temporal CSFs
IS security professionals
executive management
technology providers
users
Logical
Physical
Random
Top to Bottom
True
False
Incremental approach
Modular approach
Traditional approach
Derived approach
True
False
Economic changes
Technological changes
Internal needs and changes
Environmental changes
Technical CSFs
Industry CSFs
Environmental CSFs
Temporal CSFs
Decision box
Connector
Input/Output box
Process box
Intrusion
Damage
Threat
None of these options
True
False
Wireless communication
Intranet
Internet
None of above
Availability
Integrity
Confidentiality
All of the above
Dropper
Trojans
True
False
True
False
Sags
Brown outs
Spikes
Black out
True
False
Deployment
Development
Configuration
Testing
Inheritance
Encapsulation
Class
Polymorphism
Secondary
Derived
Primary
Multi valued
Decision box
Connector
Input/Output box
Process box
True
False
Inheritance
Class
Object
Instance
True
False
Sub classes
Sub Interfaces
Sub objects
super set
Connector
Arrow
Process
Decision
Development
Design
Requirement
Implementation
True
False
True
False
Technical CSFs
Industry CSFs
Environmental CSFs
Temporal CSFs
fixed
variable
subnet
changeable
True
False
Sub classes
Sub Interfaces
Sub objects
super set
denial of service
hacking.
Spoofing
Sniffing
Sharing
Consistency
Integrity
True
False
Systems Design
Systems Requirement
Coding
Requirement
True
False
Wireless communication
Intranet
Internet
None of above
True
False
1981
1970
2001
1992
Secondary
Derived
Primary
Multi valued
security plan
security measures
security audit
security lapse
True
False
Functional specifications
Implementation specifications
Testing specifications
Modeling specifications
True
False
True
False
True
False
True
False
Inherit
Share
Collaborate
Use
True
False
True
False
True
False
Inheritance
Encapsulation
Class
Polymorphism
Economic changes
UK
USA
India
Pakistan
True
False
True
False
True
False
True
False
True
False
DoS viruses
Worm viruses
Virus hoaxes
Trojan horses
True
False
True
False
user’s rights
privileges
integrity
privacy
True
False
Flowcharting
Research & development
UML diagrams
None of the above
False
True
True
False
True
False
Entity may be any person, place, or thing about which someone is interested to store
data.
Entity may have attributes associated with it
Entities are normally mapped to Tables in relational database management systems.
All of above
fixed
variable
subnet
changeable
True
False
True
False
System Analysis
System Design
Risk Management
Risk Analysis
Inheritance
Class
Object
Instance
Output
Input
Processing
Sequence
Economic changes
Technological changes
Internal needs and changes
Environmental changes
True
False
Data Owners
Process Owners
Executive Management
Users
Linking bridge
Empty space
Data Flows
Connection link
fixed
variable
subnet
changeable
power factor
power game
power dissipation
power fluctuation
Sharing
Consistency
Integrity
Redundancy
True
False
Social Engineering
Snooping
Spoofing
Spamming
Sub classes
Sub Interfaces
Sub objects
super set
Methods
Functions
Signatures
Interfaces
Implementation of objects
States of objects
Identity of objects
Collaboration of objects
Limited
Centralized
Flexible
Integrated
True
False
Centralized
Stand Alone
Distributed
Web based
True
False
Inheritance
Class
Object
Instance
True
False
The ability for different classes of objects to respond to identical messages is ____
Inheritance
Encapsulation
Generalization
Polymorphism
The Internet's technological success does not depend on its principal communication
tools, the Transmission Control Protocol (TCP) and the Internet Protocol (IP).
True
False
True
False
A/an_________ is a set of entities of the same type that share the same properties.
Attribute
Entity Set
Relation
Entity
Object oriented design elaborates the hardware and software architecture to produce ____
Functional specifications
Implementation specifications
Testing specifications
Modeling specifications
False
True
Technical CSFs
Industry CSFs
Environmental CSFs
Temporal CSFs
UK
USA
India
Pakistan
Dotted line
Process
Flow line
Link line
In flow chart terminator indicates from where the process starts & where its end.
True
False
A denial-of-service attack floods a Web site with so many requests for services that it
slows down or crashes
True
False
Abstraction
Note: Solve these papers by yourself
This VU Group is not responsible for any solved content
www.vuaskari,com
Composed & Solved
Askari Team
Vu Askari Team
www.vuaskari.com
Constraint
Method
Class
Sub classes
Sub Interfaces
Sub objects
super set
Object oriented design elaborates the hardware and software architecture to produce ____
Functional specifications
Implementation specifications
Testing specifications
Modeling specifications
Signatures
Classes
Methods
Objects
True
False
Testable software
Reusable software
Maintainable software
Abstraction software
Process indicates:
Procedure
Flow
Activity
Result
Which of the following activity consists of the discovery, modeling, specification and
evaluation of requirements?
Development
Design
Requirement
Implementation
Input
Processing
The purpose of a class is to specify the structure and behavior of the object.
True
False
Determining classification levels along with maintaining accuracy and integrity of the
data in the information system is the responsibility of _______.
System auditors
Data owners
Process owners
End users
Which of the following is a private enterprise owned communication network that uses
internet protocols.
Wireless communication
Intranet
Internet
None of above
True
False
Which of the following is an object that exists and is distinguishable from other objects?
Entity
Attribute
Object
Instance
The purpose of data flow diagrams is to provide a ------- between users and systems
developers
Linking bridge
Empty space
Data Flows
Connection link
Automated data are less susceptible to destruction and misuse than paper data
True
False
True
False
True
False
ERD
Flow Chart
logical diagram
DFD
Note: Solve these papers by yourself
This VU Group is not responsible for any solved content
www.vuaskari,com
Composed & Solved
Askari Team
Vu Askari Team
www.vuaskari.com
Concurrency
System behavior
Distribution
Persistence
Technical CSFs
Industry CSFs
Environmental CSFs
Temporal CSFs
The use of software routines to tie up the computer hosting a Web site that denies
legitimate visitor's access is called :
hacking.
Spoofing
Sniffing
Concurrency factor
Distribution factor
Usability factor
Persistence factor
Decision box
Connector
Input/Output box
Process box
If a flow chart become complex it is better to use connector symbols to reduce to number
of flow lines.
True
False
Integrity means data and information are protected against authorized modification
True
False
True
False
Confidentiality & availability have same meaning while considering the security of
Information Systems
False
True
Inheritance
Class
Object
Instance
System interfaces
Integrity constraints
Completeness constraints
Achievements
Sales
Risk factor
Internal changes
Sequentioal Diagram
Inherit
Share
Collaborate
Use
Object oriented design elaborates the hardware and software architecture to produce ____
Functional specifications
Implementation specifications
Testing specifications
Modeling specifications
Which one of the following computer systems uses duplication of components and data
to cope with systems failures?
Fault-tolerant systems
EIS
MIS
OIS