0% found this document useful (0 votes)
69 views4 pages

Final Assessment ANS Script

The document provides instructions for a final exam for a course on IS and Audit, including details such as the date, time, faculty member, and a reminder that valid student ID is required and late arrivals will not be allowed to take the exam. It also lists 8 questions to be answered on topics related to the course, including data privacy techniques, system security controls, network types like LAN and WAN, and digital signatures and certificates.

Uploaded by

Shaheer Khurram
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views4 pages

Final Assessment ANS Script

The document provides instructions for a final exam for a course on IS and Audit, including details such as the date, time, faculty member, and a reminder that valid student ID is required and late arrivals will not be allowed to take the exam. It also lists 8 questions to be answered on topics related to the course, including data privacy techniques, system security controls, network types like LAN and WAN, and digital signatures and certificates.

Uploaded by

Shaheer Khurram
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

INSTITUTE OF BUSINESS MANAGEMENT

Final Examinations–SPRING 2020


Course Title: IS and Audit Course code: MIS303
Faculty: Najmus Saher Shah Section: M6188
Day/Date: Tuesday12th May 2020 Time: 10.00AM – 9.45 AM
Total marks: 55

Student Name: M.Shaheer Khurram Student


ID:__25982__________________
_

Program:_______BBA(H)__________

Instructions: FOR OFFICE USE ONLY


1. Valid ID card is mandatory at all times. QUESTION TOTAL MARKS
2. Students arriving late for more than 15 minutes will not NO MARKS OBTAINED
be allowed to appear in the exam. 1
3. Impersonation may lead to permanent expulsion from
the institute. 2
4. No queries related to the question paper will he
3
entertained.
5. Students are required to mention their name and ID on 4
question paper that is to be returned along with the
answer script to the concerned faculty. 5
6. Student caught cheating/copy-pasting may be liable for 6
disciplinary action aim may lead to expulsion for a
semester. Faculty can use the option of plagiarism Part-B
checker, when answer sheets are submitted online.
1
7. Do not write the answers on this first page.
8. Use LMS to submit your answer sheets. Avoid any other 2
medium.
TOTAL
Total Number of Questions: ____8_____

Faculty Signature
Q1)(a)
Stephanie is ex accountant employee of a firm and she knew about how to deal with accounting
related things, after working as a cleaner; she leaked all the information of employees and use
all data for her personal gains and then she used all data she collected then overstated the
inventory and earned up to $125K monthly, when someone from her company ordered that
they need to keep eye on her suspicious activities, but she clear the data by using virus etc. So,
if company is having a strong department like internal audit control and security check on
systems and efficient operating system that convey idea that if someone attack on it so might
the cleaver company might save from this fraudulent activity.

Q1)(b)
Specific or control techniques need to adopt in order to maintain the privacy of employees,
they should maintain a strong security system to have better safety of data, and for employees
they should come up with innovative idea that face screening of employee or thumb impression
for the security and should have strong internal audit team so the next time they don’t face any
this type of activity, and last they don’t need to dispose off their documents in dumpster they
need to burned then or something else because of this their confidential information is leaked.

Q2 (a)
Robert’s company must have antivirus in their systems and we know they are using mainframes
so need more data safety and protection and when virus attacked might be their system almost
Facing some serious difficulties and may leads towards the loss of data so they need to have
more control over their system company should keep system updated why they allowed
employees to install software in company system because it’s their responsibility not
employee’s, and company should not give much access to employees to install software.

Q2 (b)
When the former employee left the company, so the company should take responsibility of
taking his credentials back and why the company gives full rights to him/her, even afterwards if
she stole any strategy of a company or any kind of information he can leak if someone do
undue influence on her, the company might out of the competition and company should taken
back all the credentials and before leaving their former employees and should have better
operating system and team to fight over situation if the things get out of hand in future and
make sure the relevant data and information will not be use in any suspicious activity which
might cost them later.
Q3)
A 1 N 14
B 2 O 15
C 3 P 16
D 4 Q 17
E 5 R 18
F 6 S 19
G 7 T 20
H 8 U 21
I 9 V 22
J 10 W 23
K 11 X 24
L 12 Y 25
M 13 Z 26

e w t m v i
5 23 20 13 22 9
1 19 16 9 18 5
a s p i r e

x s
24 19
20 15
t o

m r w t m
13 18 23 20 13
9 14 19 16 9
i n s p i

Given code: ewtmvi xs mrwtm


After decoding: aspire to inspi

Caesar Cipher method is old type of method for encryption because we use A=1,B= 2, then after
encrypted data we have to add 4 so the value will become coded, in the above question we are
provided with the data we have to decode 1 st we have to convert alphabets into numbers we
will subtract key then we get the desired output as shown above.
Q4) LAN:
LAN stands for local area network, which is used in the local premises of a school, business
and offices. Because the computer connected together in the same building, LAN computers
exchange their data and messages or information in a faster way and it saves time.

WAN:
WAN is wide area network, which is used in wide areas like cross regional, broad area and like
covering the boundaries of metropolitan state or etc. advantages are high bandwidth cover the
global organization need, but it has more security issues than LAN.

Our University uses LAN or we can say Campus area network as well, our university uses only
these two, because there is no need of WAN in universities or campuses.

Digital Signature and Certificate:


Digital signature is use to verify the authenticity and integrity and prove that notification send
by user or some real person not a hacker or modified. Whereas, Digital Certificate is used to
verify that sender or receiver’s ID must be original to avoid any kind of consequences.

You might also like