1. Which of the following is to be done the auditor while internet banking services audit ?
[A] Tour the server room
[B] The user is not allowed to login after defined repeated failed attempts [C] Contract clearly states the services that will be provided by the vendor [D] All of the above [E] None of these (Ans):-A
2. ___________ can be one of the approach used to tax online transactions . [A] Permanent establishment [B] Residence based [C] Income based classification [D] All of the above [E] None of these (Ans):-D
3. To stop unauthorized access to the computer systems we should : [A] Have a trust worthy system administrator [B] Have a sound encryption policy [C] Have as good password policy [D] All of the above [E] None of these (Ans):-C
4. An attack on network will not bother to do : [A] Network Investigation [B] Network Management [C] Access Gaining [D] Escaping [E] None of these (Ans):- B
5. Which of the following details do you think should be checked on security breaches? [A] Authorized access to system resources [B] Un-authorized access to system [C] Un-authorized attempts to change security definitions [D] All of the above [E] None of these (Ans):-D
6. The internet is an example of a: [A] Packet switched network [B] Cell switched network [C] Circuit switched network [D] All of the above [E] None of the above (Ans):-A
7. Which of the following methods are NOT used by kerbaos to establish a secure connection between the client and the target server? [A] OCR [B] Secret key [C] Password [D] Al of these [E] None of these (Ans):-C
8. ____________ is the process of organizing data in tables with the object of elimination redundancy and inconsistent dependency. [A] Data modeling [B] Normalization [C] Data mining [D] All of these [E] None of these (Ans):-B
9. Which can be used for development for an application? [A] Data [B] Human factor [C] Technology [D] All of these [E] None of these (Ans):-D
10. The security features of the application should be the time of [A] Programming phase [B] Conceptual design [C] Testing phase [D] All of these [E] None of these (Ans):-B
11. Which of the following statements is FALSE pegarding selection of hardware / software? [A] Budget allocated for application is limited to hardware and software cost. [B] The application should be easy to use by programming rather than by the end user [C] The requirement for the application should be decided [D] All of these are false [E] None of these (Ans):-B
12. A good data base should have [A] Financial stability of the vendor [B] Scope for achieves [C] Provision for data integrity and system integrity [D] All of the above [E] None of these (Ans):-D
13. To check if data that is being entered does not have blanks, we have [A] A mathematically calculated check digit [B] Control check to verify if the data is in accordance to pre-determined criteria [C] Competeness check [D] All of these [E] None of these (Ans):-C
14. A detective control is used to check if correct numbers are keyed in [A] Sequence check [B] Manual check [C] Check digits [D] All of these [E] None of these (Ans):-C
15. On August 23,2005, an an accounting clreck prepared an invoice dated August 31,2005, Which control can check this ? [A] Size check [B] Hash total [C] Range check [D] All of the above [E] None of these (Ans):-C
16. Processing control procedures have [A] Authorization and authentication of users [B] Access control for online data [C] Reporting of before and after images [D] All of these [E] None of these (Ans):-D
17. Which cannot assure data accuracy in an application? [A] Control total [B] Limit and reasonableness test [C] Echo checking [D] All of these [E] None of these (Ans):-C
18. A computer works faster with [A] GUI [B] Mouse [C] Keyboard [D] All of these [E] None of these (Ans):-C
19. SMTP protocol is used for [A] Sending email messages between servers [B] Sits between client server [C] Transmit news to all clients [D] All of the above [E] None of these (Ans):-A
20. Which form of job scheduling uses triggers? [A] Manual scheduling [B] Distributed scheduling [C] Mainframe scheduling [D] Automated scheduling [E] None of these (Ans):-C