It301-week-12-to-13

  • Uploaded by: Beriah Buan
  • 0
  • 0
  • March 2021
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View It301-week-12-to-13 as PDF for free.

More details

  • Words: 616
  • Pages: 3
Loading documents preview...
A firewall is used in a system connected to a wide area network to -hacker Why is there a need to control in information system? Information system stores large volume of data. By auditing around the computer we mean d. the programs and procedures are checked for correctness This is concerned with protecting data from erasure, theft, unauthorized access and unauthorized modifications. data security A type of testing wherein incorrect inputs, incorrect processing and incorrect outputs will be detected during operation. system testing This is concerned with protecting data regarding individuals from being accessed and used without the permission/knowledge of concerned individuals. data privacy This is processing control that is use to check intermediate results in long and complex calculations. check points Which of the following is an objective of control? all * This is concerned with the quality and reliability of raw as well as processed data. data integrity Organizational measures in control mean . a set of well organized methods* Aldrin want to conduct a testing of the developed information system together with the manual system using live data. What kind of testing Aldrin will conduct? parallel Aldrin want to conduct a testing of the developed information system together with the manual system using data used from manual system to test system when it is first implemented. What kind of testing Aldrin will conduct? pilot Aldrin is the Systems Analyst of the company. As a System Analyst, he need to ensure logs are kept, who did in critical data entry and processing. What does Aldrin need to implement?

audit * Ronnie want to protect his data when sending from the main office to the branch office. Which of the following information security he will apply? encryption Which of the following does NOT considered as potential threats to security of the Information System? hacking Which of the following is a control technique during input preparation? data entry Errors are found in an operational information system will result to redesigning*

Ronnie is the IT Security Officer of the TRA Corporation. His task is to secure/protect the data and programs of the company. Which of the following action he will do? backup * This is a potential threat wherein an interruption in an authorized user's access to a computer network. denial Electronic Data Interchange is necessary in a. Commerce using internet 2&4 ** This is a security device deployed at the boundary of an organization's network to protect it from unauthorized external access. firewall Aldrin is the network engineer of the TRA Corporation. TRA Corporation has offices in Cebu, Iloilo and in Davao. As a network engineer, he need to connect the LAN of different offices to the main office in Makati City. router * Use ___________________ to attach EDI forms to e-mail messages MIME After encryption, a transformed data is also known as CIPHER

EDIFACT standard was developed by c. United Nations Economic Commission for Europe Ronnie want to protect his data when sending from the main office to the branch office. Which of the following information security he will apply? encryption Two corporate intranets may be interconnected using a leased line from PSTN -such a network is called __________ LAN* The process of unscrambling the message is called decrpytion In the E commerce, a customer sends an order over the internet. To secure the order, encrypted Information System is being tested as a whole system. What kind of testing is being conducted? full This is a computer-to-computer exchange of business documents in a standard electronic format between business partners EDI When sending data from the source to destination, the message is ____________. BROKEN INTO PACKETS In ER Model, a relationship is represented by a diamond

More Documents from "Beriah Buan"

It301-week-12-to-13
March 2021 0