Correct answer: (B)
determining whether a system is performing as per specifications
2
Security in the design of information system is used to
Detailed Answer
Correct answer: (B)
protect data and programs from accidental or intentional loss
3
Some security measures commonly used are
i. data encryption
ii. logging of all accesses to an information system and recording changes made (if any)
iii. data compression
iv. copying of files
Detailed Answer
Correct answer: (C)
i and ii
4
Controls are necessary in information systems as
i. massive amounts of data are processed and human errors are expected in data entry
ii. accidental errors can lead to loss of money and credibility in a system
iii. to protect the system from virus attack
iv. data may be lost due to disk crashes
Detailed Answer
Correct answer: (A)
i and ii
5
Audit in the design of information system is used to
Detailed Answer
Correct answer: (A)
inspect the system and check that it is built as per specifications
6
A two way check
Detailed Answer
Correct answer: (A)
calculates the same quantity in two different ways and compares them for equality
7
Some of the features of audit package used to check systems are:
i. facility to total specified items based on some criteria
ii. extracting items based on some criteria for checking
iii. check-pointing and restart facility
iv. hardware faults recovery
Detailed Answer
Correct answer: (B)
i, ii, iii
8
By string test we mean
Detailed Answer
Correct answer: (D)
The output of a program is sent as input to related program(s) to see if data is transferred correctly
9
The following measures are taken to ensure security of information systems:
i. duplicate copies of data/programs are kept in a different place preferably in fire-proof vault
ii. password protection is used to prevent unauthorized access
iii. no one is allowed to alter data in the database
iv. no one is allowed alter programs
Detailed Answer
Correct answer: (A)
i and ii
10
The major objectives of control areAt each check-point
i. guard against frauds in data entry/processing
ii. check clerical handling of data before it enters a computer
iii. to provide a method to trace the steps and find where error has occurred
iv. automatically correct errors in data entry/processing