Computer Knowledge MCQ-44

Which of the following is to be done the auditor while internet banking services audit?

(A) Tour the server room
(B) The user is not allowed to login after defined repeated failed attempts
(C) Contract clearly states the services that will be provided by the vendor
(D) All of the above
(E) None of these

________ can be one of the approach used to tax online transactions.

(A) Permanent establishment
(B) Residence based
(C) Income based classification
(D) All of the above
(E) None of these

To stop unauthorized access to the computer systems we should:

(A) Have a trust worthy system administrator
(B) Have a sound encryption policy
(C) Have as good password policy
(D) All of the above
(E) None of these

An attack on network will not bother to do:

(A) Network Investigation
(B) Network Management
(C) Access Gaining
(D) Escaping
(E) None of these

Which of the following details do you think should be checked on security breaches?

(A) Authorized access to system resources
(B) Un-authorized access to system
(C) Un-authorized attempts to change security definitions
(D) All of the above
(E) None of these

The internet is an example of a:

(A) Packet switched network
(B) Cell switched network
(C) Circuit switched network
(D) All of the above
(E) None of the above

Which of the following methods are NOT used by Kerberos to establish a secure connection between the client and the target server?

(B) Secret key
(C) Password
(D) All of these
(E) None of these

________ is the process of organizing data in tables with the object of elimination redundancy and inconsistent dependency.’

(A) Data modeling
(B) Normalization
(C) Data mining
(D) All of these
(E) None of these

Which can be used for development for an application?

(A) Data
(B) Human factor
(C) Technology
(D) All of these
(E) None of these.

The security features of the application should be the time of

(A) Programming phase
(B) Conceptual design
(C) Testing phase
(D) All of these
(E) None of these

Which of the following statements is “FALSE” pegarding selection of hardware / software?

(A) Budget allocated for application is limited to hardware and software cost.
(B) The application should be easy to use by programming rather than by the end user
(C) The requirement for the application should be decided
(D) All of these are false
(E) None of these

A good data base should have

(A) Financial stability of the vendor
(B) Scope for achieves
(C) Provision for data integrity and system integrity
(D) All of the above
(E) None of these

To check if data that is being entered does not have blanks, we have

(A) A mathematically calculated check digit
(B) Control check to verify if the data is in accordance to predetermined criteria.
(C) Completeness check
(D) All of these
(E) None of these

A detective control is used to check if correct numbers are keyed in

(A) Sequence check
(B) Manual check
(C) Check digits
(D) All of these
(E) None of these

On August 23, 2005, an accounting clerk prepared an invoice dated August 31,2005, Which control can check this?

(A) Size check
(B) Hash total
(C) Range check
(D) All of the above
(E) None of these

Processing control procedures have

(A) Authorization and authentication of users
(B) Access control for online data
(C) Reporting of before and after images
(D) Ail of these
(E) None of these

Which cannot assure data accuracy in an application?

(A) Control total
(B) Limit and reasonableness test
(C) Echo checking
(D) All of these
(E) None of these