Sie sind auf Seite 1von 3

Information Technology: IT Applications

The following questions have been taken from the Cambridge Checkpoints 2007
– VCE IT Applications – Potts. (Also check out the online quizzes at
www.cambridge.edu.au/checkpoints)

CHAPTER 6
Data and Information Security
Question 1
Explain the meaning of the term data integrity.

Question 3
Explain the purpose of data validation. Give one example.

Question 7
VirtualArtShow.com is an on-line art gallery. The purpose of it is to allow
potential clients to view and purchase artworks on-line. Each piece of art is
photographed and then this photograph is placed in the software for display on
the website. It has come to the manager’s attention that some of the
photographs of the artworks have been altered on the website.

a. Describe the potential impact of this action to VirtualArtShow.com

b. Describe a suitable security strategy for VirtualArtShow.com that would


minimise the likelihood of this occurring again in the future.

Question 11
The following events happen frequently in offices. Choose four of the events and
explain why each one would represent a security threat to the data stored in the
organisation’s information system.

a. A door is propped open and doesn’t have a lock.

b. A cup of coffee is set on a computer case.

c. Equipment is plugged into wall sockets without a surge protector.

d. Backup files are stored in the same room as the original files.

e. Floppy disks are shared haphazardly and are not labelled.

f. Someone’s password is written and posted on their monitor.

g. A computer is logged on, but has been left unattended.

Question 14 [VCAA 2000] = 2 Marks

a. Explain how data encryption helps to preserve the integrity of data being
transmitted across networks.
b. If unencrypted data is called plain text, what is encrypted data called?

Question 16
A chemistry student is searching for a shareware software to help her understand
the Periodic Table of Elements. She finds a program called ChemTable.exe and
downloads it off the Internet. Before she can use it, however, a friend warns her
that ChemTable is a Trojan Horse that has reformatted his hard disk.

a. How does a Trojan Horse work?

b. Trojan Horses and viruses can destroy valuable information. How is a virus
different from a Trojan Horse?

Question 18 [VCAA 2005] = 3 Marks

a. List two features that improve password security.

Feature 1

Feature 2

b. Select one feature from part a. and explain why this is necessary.

Question 21
In general, there are three types of backup strategies:

a. A complete backup

b. A partial backup

c. An incremental backup

Explain what each of these backups involves.

Question 25 [VCAA 2003] = 8 Marks


Springfield Lending Library opens on Monday to Friday from 9 am to 5 pm. The
file server stores all the programs for the library. The programs consist of an
operating system and a library program called Borrow All. Borrow All generates a
loans data file which records all items out on loan. Currently there is no back-up
even though a tape back-up unit has been purchased.

a. A computer technician makes the following three recommendations about


possible back-up procedures. For each recommendation explain one
concern you would have is it was implemented.

Recommendation 1 – two tapes be purchased and rotated.

Concern:
Recommendation 2 – all program files be backed up daily.

Concern:

Recommendation 3 – back-ups should be done at 9 am.

Concern:

b. Recommend an appropriate back-up strategy. Your strategy should cover

• Content, timing and storage of back-up

• Media and frequency of back-up

Das könnte Ihnen auch gefallen