Sie sind auf Seite 1von 2

University of Perpetual Help System laguna – Isabela Campus

Minante 1, Cauayan City, Isabela

College of Business and Accountancy


COM400 - Accounting Information System
1st Semester, A.Y. 2017 - 2018

Middle Term
Quiz 2

Name: ________________________________________ Date: ___________


Course Year & Section: _____________________ Score: __________

Instruction: Answer the following questions. Strictly NO ERASURES are allowed.

I. MULTIPLE CHOICE. Encircle the letter of your choice.


1. Unsolicited e-mail that contains either advertising or offensive content
A. SPAM
B. Identity Theft
C. Privacy
D. Flood

2. The unauthorized use of someone’s personal information for the perpetrator’s benefit.
A. SPAM
B. Identity Theft
C. Privacy
D. Flood

3. Process of transforming normal content, called plaintext, into unreadable gibberish


A. Encryption
B. Encrypt
C. Password Protected
D. Algorithm

4. Manner in which key and text is combined to create scrambled text


A. Encryption
B. Encrypt
C. Password Protected
D. Algorithm

5. One key used to both encrypt and decrypt


A. Asymmetric
B. Symmetric
C. Hybrid Solution
D. hashing

6. A facility that is not only prewired for telephone and Internet access but also contains all
the computing and office equipment the organization needs to perform its essential
business activities
A. Cold Site
B. Hot Site
C. Second Data-Center
D. Business Continuity Plan (BCP)

7. Converts information into a “hashed” code of fixed length.


A. Asymmetric
B. Symmetric
C. Hybrid Solution
D. hashing

Page 1 of 2
8. Private communication channels, often referred to as tunnels, which are accessible only
to those parties possessing the appropriate encryption and decryption keys.
A. Virtual Private Network (VPN)
B. Internet Protocol version 4 (IPv4)
C. Internet Protocol version 6 (IPv6
D. Local Area Network (LAN)

9. An empty building that is prewired for necessary telephone and Internet access, plus a
contract with one or more vendors to provide all necessary equipment within a specified
period of time
A. Cold Site
B. Hot Site
C. Second Data-Center
D. Disaster Recovery Plan (DRP)

10. Procedures to restore an organization’s IT function in the event that its data center is
destroyed
A. Cold Site
B. Hot Site
C. Second Data-Center
D. Disaster Recovery Plan (DRP)

II. ENUMERATION. Give what is being asked.

A. Processing Controls

1.
2.
3.
4.
5.
6.

B. Types of encryptions

7.
8.
9.

Page 2 of 2

Das könnte Ihnen auch gefallen