A firewall is used in a system connected to a wide area network to
-hacker
Why is there a need to control in information system?
Information system stores large volume of data.
By auditing around the computer we mean
d. the programs and procedures are checked for correctness
This is concerned with protecting data from erasure, theft, unauthorized access and
unauthorized modifications.
data security
A type of testing wherein incorrect inputs, incorrect processing and incorrect
outputs will be detected during operation.
system testing
This is concerned with protecting data regarding individuals from being accessed
and used without the permission/knowledge of concerned individuals.
data privacy
This is processing control that is use to check intermediate results in long and
complex calculations.
check points
Which of the following is an objective of control?
all *
This is concerned with the quality and reliability of raw as well as processed
data.
data integrity
Organizational measures in control mean
. a set of well organized methods*
Aldrin want to conduct a testing of the developed information system together with
the manual system using live data. What kind of testing Aldrin will conduct?
parallel
Aldrin want to conduct a testing of the developed information system together with
the manual system using data used from manual system to test system when it is
first implemented. What kind of testing Aldrin will conduct?
pilot
Aldrin is the Systems Analyst of the company. As a System Analyst, he need to
ensure logs are kept, who did in critical data entry and processing. What does
Aldrin need to implement?
audit *
Ronnie want to protect his data when sending from the main office to the branch
office.
Which of the following information security he will apply?
encryption
Which of the following does NOT considered as potential threats to security of the
Information System?
hacking
Which of the following is a control technique during input preparation?
data entry
Errors are found in an operational information system will result to
redesigning*
Ronnie is the IT Security Officer of the TRA Corporation. His task is to
secure/protect the data and programs of the company. Which of the following action
he will do?
backup *
This is a potential threat wherein an interruption in an authorized user's access
to a computer network.
denial
Electronic Data Interchange is necessary in
a. Commerce using internet
2&4 **
This is a security device deployed at the boundary of an organization's network to
protect it from unauthorized external access.
firewall
Aldrin is the network engineer of the TRA Corporation. TRA Corporation has offices
in Cebu, Iloilo and in Davao. As a network engineer, he need to connect the LAN of
different offices to the main office in Makati City.
router *
Use ___________________ to attach EDI forms to e-mail messages
MIME
After encryption, a transformed data is also known as
CIPHER
EDIFACT standard was developed by
c. United Nations Economic Commission for Europe
Ronnie want to protect his data when sending from the main office to the branch
office.
Which of the following information security he will apply?
encryption
Two corporate intranets may be interconnected using a leased line from PSTN -such a
network is called __________
LAN*
The process of unscrambling the message is called
decrpytion
In the E commerce, a customer sends an order over the internet.
To secure the order,
encrypted
Information System is being tested as a whole system. What kind of testing is being
conducted?
full
This is a computer-to-computer exchange of business documents in a standard
electronic format between business partners
EDI
When sending data from the source to destination, the message is ____________.
BROKEN INTO PACKETS
In ER Model, a relationship is represented by a
diamond